Privacy and Security Litigation in 2006

Transcription

Privacy and Security Litigation in 2006
February 2006 • Volume 6 • Number 2
Editor: Kirk J. Nahra
Privacy and Security Litigation in 2006: Is the Tide Turning?
Kirk J. Nahra
ne of the key open questions for
the privacy and security community in the past few years has
been “where are the lawsuits?” Despite
the enormous volume of new state and
federal laws and regulations, the amount
of litigation related to privacy and security issues has been much smaller than
was predicted by most “experts.”
O
Why Hasn’t there been More
Litigation?
This is the $64,000 question. With
the flurry of privacy and security rules in
the past decade, creating new kinds of
statutory obligations for virtually every
business that compiles, uses or main-
vate claim, even if a “HIPAA
violation” appears to have
been alleged.
tains personal information,
why hasn’t there been more
litigation?
Three major reasons
stand out.
• While there has been a
flood of new privacy obligations, most new laws
have been passed without
any obvious private right of
Kirk J. Nahra
action. So, under HIPAA
and Gramm-Leach-Bliley,
for example, there are no clear paths
for bringing a suit, even if a potential
claim surfaced. Courts have rejected
efforts to put a HIPAA label on a pri-
Coordinating Cookie Compliance
• Within the limited range
of suits that have been
brought, there is a reasonable trend that makes
proof of damages exceedingly difficult. One key
case to remember —
Smith v. Chase
• Manhattan Bank, 741
N.Y.S.2d 100 (App. Div.
2002).
See Litigation, page 3
This Month
Ben Isaacson
onsumers are becoming increasingly skeptical of the Internet’s use
of persistent cookies and are now
taking action. Recent consumer surveys
from companies, such as Jupiter
Research, showed that up to 40 percent
of Internet users delete cookies on a
monthly basis.
Even more relevant is a recent
BURST! Media
survey showing
that 35 percent
of respondents
believe that
personal information is unsafe
as a result of
cookies on their
Ben Isaacson
C
computers. These attitudes clearly
indicate a need to increase transparency
and trust with all types of cookie usage.
In order to accomplish this goal, Web site
owners are encouraged to focus on
technology implementations, value
propositions, enabling choice and policy
disclosures.
Transparency Begins With
Technology
The issue of governmental cookie
use was highlighted recently in a recent
CNET investigation. The results were
alarming because executive and
congressional branch offices were using
them in violation of their privacy poli-
J. Trevor Hughes on the Need for
a Proactive Privacy Strategy.............Page 2
Message from
the IAPP President ...........................Page 7
Ask the Privacy Expert ......................Page 8
Electronic Monitoring
in the Workplace...............................Page 9
Interview with Dr. David Brailer,
IAPP National Summit 2006
Keynote Speaker...............................Page 13
Internet Alliance:
Recent State Action ..........................Page 14
Privacy Enhancing Technologies.......Page 16
Web Watch: Privacy and Security
Predictions for 2006 ..........................Page 18
Privacy News ...................................Page 19
See Cookie Compliance, page 5
February • 2006
THE PRIVACY ADVISOR
Editor
Kirk J. Nahra
Wiley Rein & Fielding, LLP
[email protected]
+202.719.7335
Managing Editor
Ann E. Donlan
[email protected]
+207.351.1500 X109
The Privacy Advisor (ISSN: 1532-1509 )
is published monthly by the International
Association of Privacy Professionals and
distributed only to IAPP members.
ADVISORY BOARD
Elise Berkower, CIPP, Senior Privacy Compliance Officer,
DoubleClick Inc.
Keith P. Enright, Director, Customer Information
Management, Limited Brands, Inc.
Philip L. Gordon, Shareholder, Littler Mendelson, P.C.
Brian Hengesbaugh, Partner, Privacy/Information
Technology/E-Commerce, Baker & McKenzie LLP
Todd A. Hood, CIPP, Director, Regional Privacy,
The Americas, Pitney Bowes Inc.
Ben Isaacson, CIPP, Privacy & Compliance Leader,
Experian & CheetahMail
Jacqueline Klosek, CIPP, Senior Associate in the
Business Law Department and member of Intellectual
Property Group, Goodwin Procter LLP
Lydia E. Payne-Johnson, CIPP, Executive Director,
Chief Privacy Officer, Morgan Stanley
Billy J. Spears, CIPP/G, Director, Privacy Education
and Training, Department of Homeland Security
Harry A. Valetk, CIPP, Director, Privacy Online,
Entertainment Software Rating Board
To Join the IAPP, call:
+800.266.6501
Advertising and Sales, call:
+800.266.6501
Postmaster
Send address changes to:
IAPP
266 York Street
York, ME 03909
Subscription Price
The The Privacy Advisor is a benefit of
membership to the IAPP. Nonmember
subscriptions are a vailable at $199 per year.
Requests to Reprint
Ann E. Donlan
[email protected]
+207.351.1500 X109
Copyright 2005 by the International Association of
Privacy Professionals.
All rights reserved. Facsimile reproduction, including
photocopy or xerographic reproduction, is strictly
prohibited under copyright laws.
2
Notes from the Executive Director
t has been nearly a year since ChoicePoint Inc. announced
that personal information belonging to 145,000 people was
in the clutches of criminals who duped the company into
turning over the sensitive data.The incident seemed to touch
off an avalanche of subsequent breaches that ultimately led last
year to scores of new state laws and several bills in Congress.
Last month, the Federal Trade Commission (FTC)
announced a proposed $15 million settlement with
ChoicePoint — including a $10 million fine, the largest civil
penalty the FTC has levied in its history. Undoubtedly, the
FTC settlement sends a stark message that the price will be high for companies that
fail to adopt data security policies that effectively protect the privacy of consumers’
personal information. And ChoicePoint is not alone.The security breach landscape is
dotted with incidents from DSW, Bank of America,T-Mobile, CardSystems Solutions,
Lexis-Nexis, BJ’s Wholesale Club, numerous colleges and universities — even the U.S.
government.
While the impact of a record fine is evident on a company’s bottom line, the
damage done to its reputation and brand is more elusive. Rather than injecting privacy
and data security into the company’s consciousness, firms that adopt inadequate policies
and procedures — or worse, none at all — stand to lose control of their destiny. Part of
the FTC settlement requires ChoicePoint to undergo independent audits every two
years for the next 20 years.
The FTC alleged that ChoicePoint violated consumers’ privacy and broke federal laws.
ChoicePoint did not admit to any of the FTC’s charges, but stressed that it was happy to
leave the debacle behind and move forward with the changes already under way.
However, those of us committed to privacy and data security know we must
continue to anticipate the challenges ahead of us that change continuously as
technology and innovation thrives in the marketplace.We know that serving customers
and shareholders will require an enduring commitment as we strive to foster a
proactive, model privacy strategy in our workplaces.
Privacy experts have lauded the FTC settlement for serving not just as a
punishment, but for sending companies a clear warning about the seriousness of
privacy and data security: play or pay. Next month, the IAPP will offer privacy pros an
opportunity to hear directly from a FTC commissioner when we gather in Washington,
D.C., for the IAPP National Summit 2006, March 8-10.
Given the stakes for companies facing a growing body of differing state or
provincial laws, the specter of new federal laws and scrutiny from regulators, I urge
privacy pros not to miss the exciting opportunity to expand and share your expertise
next month during the largest and most anticipated privacy conference.The IAPP’s
comprehensive agenda offers education in various disciplines, at various levels.We have
sessions on ID theft, genetic privacy, international and domestic privacy and
outsourcing — to name a few.The Summit offers the unique opportunity to network
with public policymakers, regulators and Capitol Hill contacts. An investment in the
Summit will be money well-spent — 2006 has already demonstrated that security
breaches will remain a front-burner issue in board rooms, living rooms and on the
floors of our lawmaking bodies.
Please join me and the IAPP staff at the Summit next month as we celebrate an
IAPP milestone — our 5th anniversary.We’ve come a long way, but we hope you will
join us for the ongoing journey.
I
J.Trevor Hughes
Executive Director
THE PRIVACY ADVISOR
Litigation
continued from page 1
In Smith, a bank promised its
customers that it would not sell their
personal information to third parties.
Instead, the suit alleged, the bank did sell
customer lists to third parties, including
a telemarketing firm. Moreover, the bank
allegedly received a percentage of the
products sold as a result of these telemarketing services. A class of bank customers sued, alleging that the bank violated its obligations to the plaintiff class.
Despite this egregious set of
allegations, the court’s decision is
startling. The court dismissed the complaint, finding no allegations of actual
damages. Instead, the court said that
“the ‘harm’ at the heart of this purported
class action, is that class members were
merely offered products and services
which they were free to decline. This
does not qualify as actual harm.”
Moreover, “[t]he complaint does not
allege a single instance where a named
plaintiff or any class member suffered
any actual harm due to the receipt of an
unwanted telephone solicitation or a
piece of junk mail.” Accordingly, the
court found that the complaint was
appropriately dismissed for failure to
state a cause of action. This means that
the court found that no claim existed on
“In many arenas,
successful class action
litigation follows
significant government
enforcement activity. In
the privacy and security
realm, government
enforcement obviously
has been limited and,
in some cases, almost
non-existent.”
the facts as they were alleged, not that
the allegations were wrong.
Smith is the clearest enunciation of
the “no damages” theory — but not the
only one. Clearly, with other fish
to fry, the plaintiffs’ bar has not been
impressed by the potential “pot of gold”
related to privacy litigation. Nor, despite
the increase in litigation in 2005, is there
any particular reason to think that courts
are in any way more sympathetic to
claims of damages in connection with
potential privacy and security harms.
In many arenas, successful class
action litigation follows significant government enforcement activity. In the privacy and security realm, government
enforcement obviously has been limited
and, in some cases, almost non-existent.
So, whereas there are virtually automatic
lawsuits filed when the SEC takes
enforcement action against a publicly
traded company, there have been few
“lead events” by the government
enforcement agencies that have led to
follow-on class action litigation.
2005 Recap
So, what were we starting to see in
2005?
First, we did see the start of some
more aggressive enforcement activity,
particularly by the Federal Trade
Commission. The FTC’s action in the
BJ’s Wholesale matter, for example, has
led to more litigation that virtually all of
the other enforcement actions taken
together. The recent Do Not Call
settlement with DirectTV — including a
whopping $5.3 million dollar penalty —
has shattered the bar for privacy-related
settlements.
Second, we are starting to see highly publicized events — mainly security
breaches — where visibility and potential
harm combine to create a higher
likelihood of litigation. The plethora of
publicity related to the infamous
ChoicePoint breach, for example (the
first major security breach of 2005), led
to a significant volume of class-action
and even securities litigation (although,
interestingly, none of these cases have
266 York Street
York, ME 03909
Phone: +800.266.6501 or +207.351.1500
Fax: +207.351.1501
Email: [email protected]
The Privacy Advisor is the official monthly newsletter of the
International Association of Privacy Professionals. All active
association members automatically receive a subscription to
The Privacy Advisor as a membership benefit. For details
about joining IAPP, please use the above contact information.
BOARD OF DIRECTORS
President
Kirk M. Herath, CIPP/G, Chief Privacy Officer,
Associate General Counsel Nationwide Insurance
Companies, Columbus, Ohio
Vice President
Sandra R. Hughes, CIPP, Global Privacy Executive, Procter
& Gamble, Cincinnati, Ohio
Treasurer
Becky Burr, CIPP, Partner, Wilmer Cutler Pickering Hale
and Dorr LLP, Washington, D.C.
Secretary
Dale Skivington, CIPP, Chief Privacy Officer, Assistant
General Counsel, Eastman Kodak Co., Rochester, N.Y.
Past President
Chris Zoladz, Vice President, Information Protection,
Marriott International, Bethesda, Md.
Executive Director
J. Trevor Hughes, CIPP, York, Maine
Jonathan D. Avila, Vice President, Chief Privacy Legal
Officer, The Walt Disney Co., Burbank, Calif.
John Berard, CIPP, Managing Director,
Zeno Group, San Francisco, Calif.
Agnes Bundy Scanlan, Esq., CIPP, Counsel,
Goodwin Procter LLP, Boston, Mass.
Peter Cullen, CIPP, Chief Privacy Strategist,
Microsoft Corp., Redmond, Wash.
Dean Forbes, CIPP, Chief Privacy Officer,
Schering-Plough Corp., Kenilworth, N.J.
Kimberly Gray, CIPP, Chief Privacy Officer,
Highmark, Inc., Pittsburgh, Pa.
Jean-Paul Hepp, CIPP, Chief Privacy Officer,
Pfizer Inc., New York, N.Y.
David Hoffman, CIPP, Group Counsel and Director of
Privacy, Intel Corp., Germany
Barbara Lawler, CIPP, Chief Privacy Officer, Intuit,
Mountain View, Calif.
Kirk Nahra, CIPP, Partner, Wiley Rein & Fielding LLP,
Washington, D.C.
Nuala O’Connor Kelly, CIPP/G, Chief Privacy Leader,
General Electric Company, Washington, D.C.
Harriet Pearson, CIPP/G, Vice President Corporate Affairs,
Chief Privacy Officer, IBM Corporation, Armonk, N.Y.
Jules Polonetsky, CIPP, Vice President,
Integrity Assurance America Online, Inc., Dulles, Va.
Lauren Steinfeld, CIPP, Chief Privacy Officer,
University of Pennsylvania, Philadelphia, Pa.
Zoe Strickland, CIPP/G, Chief Privacy Officer,
U.S. Postal Service, Washington, D.C.
Amy Yates, CIPP, Chief Compliance Manager,
Hewitt Associates, Lincolnshire, Ill
GENERAL COUNSEL
Jim Koenig, Pricewaterhouse Coopers, Philadelphia, Pa.
See Litigation, page 4
3
February • 2006
Litigation
continued from page 3
settled, and the litigation is proceeding
very slowly). While government enforcement often is a precursor to private litigation, media reports (such as a quick drop
in stock price) often lead to suits as well.
We are starting to see this “prompt”
private response to these kinds of media
stories, even in the absence of government action.
Third, we started to see an interesting set of “follow-on” cases. Rather than
starring injured consumers as the plaintiffs, corporate entities are starting to
sue, basing their claims on out-of-pocket
costs to prevent or mitigate identity theft
concerns, as a result of someone else’s
security breach. Putting aside the question of whether corporate America wants
to start this fight, certain entities, primarily banks or others that incur costs
when there is an identity theft problem,
have been initiating lawsuits. Clearly,
these cases involve specific out-of-pocket costs — such as the costs of replacing credit cards or reimbursing for fraudulently obtained purchases. Causation
obviously will be an issue (is the company whose security was breached really
the responsible party for fraudulent purchases?). But these cases are being
brought by (often deep-pocketed) companies, with an eye toward re-allocating the
costs of privacy and security breaches.
“Rather than starring
injured consumers as
the plaintiffs, corporate
entities are starting to
sue, basing their claims
on out-of-pocket costs
to prevent or mitigate
identity theft concerns,
as a result of someone
else’s security breach.”
4
Fourth, plaintiffs struggled — and
often failed — to fit their privacy
concerns into a framework that allowed
them to bring a case. For example, in
the JetBlue saga, a nationwide class of
airline passengers sued JetBlue, based
on the company’s alleged transfer of
data to a third party government contractor. This complaint was dismissed, with
the court rejecting the plaintiffs’ assertion that JetBlue had violated the
Electronic Communication Privacy Act.
Interestingly, relying in part on the
Smith case, the court also rejected the
argument that the plaintiffs could assert
actual damages under various causes of
action. In connection with a breach of
contract claim, the court stated that “the
sparseness of the damages allegations
is a direct result of plaintiffs' inability to
plead or prove any actual contract damages. As plaintiffs' counsel concedes,
the only damage that can be read into
the present complaint is a loss of privacy.” Moreover, the court found that the
passengers “had no reason to expect
that they would be compensated for the
‘value’ of their personal information. In
addition, there is absolutely no support
for the proposition that the personal
information of an individual JetBlue
passenger had any value for which that
passenger could have expected to be
compensated.”
Last, in connection with a “trespass
to chattel” claim, the court again rejected any assertion of actual damages,
stating that “[t]he only type of harm
plaintiffs allege anywhere in the
Amended Complaint is harm to their privacy interests, and even if their privacy
interests were indeed infringed by the
data transfer, such a harm does not
amount to a diminishment of the quality
or value of a materially valuable interest
in their personal information.”
Fifth, privacy issues and laws are
involved in a wide variety of cases, even
if the case is not “about” privacy. An
Ohio Court (in Grove v. Northeast Ohio
Nephrology Associates) evaluated the
question of whether an Ohio statute
over-rode HIPAA to protect certain thirdparty medical records in a case involving
allegations about a medical facility’s stan-
“As security breaches
continue to resonate in
the public eye and with
the media, we also can
expect more fingerpointing — resulting in
commercial litigation.
Was it the software
company’s fault? Or the
vendor that helped
implement a new
security system?”
dard of care. A Minnesota court (in
Johnson v. Parker Hughes Clinic) rejected efforts by a widow to seek access to
her husband’s medical records, relying
on the fact that HIPAA does not create a
private cause of action.
What can we see on the horizon?
Litigation over identity theft: One real
harm that has resulted in many security
breach situations involves identity theft.
This crime is real — with real impact on
specific individuals. It also is true that
many “identity theft” cases actually
involve a security breach of some kind,
where the risk of identity theft is small
or non-existent. Many companies are
confusing a loss of data with an identity
theft scam. If a laptop is stolen, is there
“identity theft” risk, or simply the theft
of personal property? These issues will
remain challenging in 2006 — particularly
as a wave of new security breach notification laws go into effect — but it is
clear that actual and potential identity
theft are driving forces to a new category of privacy litigation.
Litigation related to security breaches:
As security breaches continue to resonate in the public eye and with the
media, we also can expect more fingerpointing — resulting in commercial litiga-
THE PRIVACY ADVISOR
tion. Was it the software company’s
fault? Or the vendor that helped implement a new security system? Or the
management consultant that advised on
efficient payment practices? As enforcement efforts ratchet up, we can expect
companies to do what many do best —
point the blame at others.
or as witnesses — must be prepared to
bring their knowledge of the privacy and
security regime to bear in responding to
subpoenas and other efforts to obtain
personal information. Discovery fights
will be substantial — forcing courts to
navigate the tricky “preemption” waters
involving HIPAA and other privacy rules.
Litigation over the costs of mitigating
security breaches (meaning corporate
parties on both sides): We also can
expect that mitigation-cost litigation will
continue and expand. The test case will
be the wide range of litigation stemming
from the BJ’s Wholesale settlement.
Some of these claims already have been
rejected, but we can expect them to
continue. Companies that incur costs in
connection with identity theft — banks,
credit unions, credit card companies and
others — are watching this case closely
— and will continue to seek means of
recovering costs imposed on them by
the actions of others.
Continued Focus on the Actions of
Third Parties — With Fights Breaking
out Among the Parties: As the
DirectTV case makes clear (along with a
wide variety of privacy problems created
by vendors and other contractors), vendor actions will be attributed to the principal under many laws. Similarly, plaintiffs will look to the deep pocket. So, we
can expect efforts to “blame everyone”
in connection with privacy and security
problems, along with related litigation
and assertions among the defendants as
to overall responsibility. It may be time
for all of the vendor contracts that have
been drafted over the past few years to
start coming into play in litigation (and
should encourage companies to revisit
their overall vendor monitoring and oversight strategy, on both a domestic and
international level).
With all this background, and the
slow but steady increase in litigation
involving privacy and security issues, we
can expect that 2006 likely will be the
year when privacy and security litigation
moves to the front burner.
More Enforcement: We can expect to
see somewhat more enforcement of privacy and security rules in 2006, with
more stringent penalties ahead. The
FTC’s DirectTV case may be illustrative.
While the FTC and FCC have been
actively investigating Do Not Call violations, it takes an egregious case — and
one where behavior is not corrected —
to invoke a large fine. The same
approach seems to be playing out with
the HIPAA rules — but the other shoe
has not dropped yet. Look for the start
of the other shoe dropping in 2006.
More entanglements of privacy rules
in litigation (such as the HIPAA rules
concerning medical records): We also
are seeing a wide range of cases where
various categories of personal information are at issue in litigation matters.
Medical information, for example, is a
critical evidence component in a wide
variety of cases (such as the government’s efforts to obtain certain medical
records in the course of defending the
appropriateness of the partial birth abortion statute). Companies that are
involved in litigation — either as parties
This article was published previously in
Wiley Rein & Fielding’s Privacy in Focus
newsletter (January 2006).
Kirk J. Nahra is a partner with Wiley
Rein & Fielding LLP in Washington, D.C.,
where he specializes in healthcare, privacy, information security and counseling. He is chair of the firm’s Privacy
Practice and co-chair of its Healthcare
Practice. He was elected to the Board of
Directors of the International Association
of Privacy Professionals, and serves as
the Editor of The Privacy Advisor. He is
a Certified Information Privacy
Professional. He can be reached at
+202.719.7335 or [email protected].
Cookie Compliance
continued from page 1
cies. But the results were alarming for
another reason: The agency’s representatives did not know why the cookies
were used and they clearly did not
understand their true value.
The fact is: a cookie is not a
surreptitious tracking device. Rather,
it is an obvious and identifiable piece
of Web site information that can be
managed easily.
Cookie transparency is applicable
when initially visiting a Web page,
within the browser, and on users’
computers. Since Microsoft’s Internet
Explorer (IE) browser retains the
dominant marketshare, we can point
to their use of the Platform for Privacy
Preferences (P3P), or as they call them
‘compact privacy policies,’ to negotiate
the terms of a cookie’s use during an
initial visit to a Web page which publishes such a policy. Should a user
modify their IE privacy settings above
the default setting, they will automatically identify and block many cookies,
including any cookies that use personally identifiable information (PII) without user consent. Perhaps even more
critical is the fact that if a user
changes their IE privacy settings to
‘high,’ any cookie without a compact
privacy policy will be blocked.
If a cookie is blocked, a user will
know it immediately as the ‘red eye’ is
visible in the lower right-hand corner of
the IE browser. One click on that eye
highlights the Web site Privacy Report
and shows users which cookies are
being utilized as well as those being
blocked. (This can also be referenced
by navigating to ‘View>Privacy
Report.’) The most obvious issue
which appears in the Privacy Report is
which party is utilizing cookies on that
Web page. As noted in the CNET
investigation, the government Web
sites utilizing cookies were not actually
the entities listed within the Privacy
Report, but rather a third party Web
analytics provider. Since cookie
See Cookie Compliance, page 6
5
February • 2006
Cookie Compliance
continued from page 5
transparency is directly tied to the
domain name of the utilizing party, then
any third-party use will be clearly visible
to the end user. As a result, Web sites
are encouraged to disclose the types
of third-party relationships which use
cookies on their Web site and more
importantly, require any third-party
cookie to reference a compact policy
that adequately reflects the uses of that
cookie and correlated collected
information.
In addition, online users are becoming more aware and are utilizing tools to
reference cookies on their computer.
Whether they are referenced through
the local hard drive folder or via an antispyware program, cookies are easily
identified and potentially deleted. If the
cookie is being utilized for Web analytics
purposes, then the best practice is to
only use a cookie referenced from the
first party domain name. When considering the use of third party cookies,
Web site owners should be aware of
the domain name the cookie is referencing and whether or not a particular end
user may recognize that name or be
able to reference that domain owner
online for more information. Another
issue which is visible in a local hard
drive cookie reference is the length of
time a persistent cookie is requested to
remain on a user’s computer. While
many Web sites utilize a default
maximum expiration date of 2038, the
apparent longevity of this date may
further aggravate concerned users. As
a result, another best practice is to
consider applying the actual length of
time a cookie should be relevant, such
as the sales cycle of a given product or
average computer life span. There are
few reasons why a cookie expiration
date should exceed five years rather
than the default thirty two.
Proving the Value of Cookies
While the value proposition of a
cookie is clear to online marketers and
publishers, it is less than clear for
online users. If consumers are to better
6
understand the value of cookies, then
Web site owners must correlate the
value of the cookie with the services
rendered through the Web site and in a
highly visible reference point separated
from the privacy policy. Publishers can
reinforce the value of free content,
e-commerce sites can emphasize
merchandizing relevancy and usability
and loyalty programs can spare users
an extra login step. If each of these
categories of Web sites communicates
a simple value proposition at a visible
point of cookie utilization, then most
users would better understand and
(hopefully) increase their support of
cookie uses.
What is perhaps most important is
the disclosure and value proposition of
associating cookies with PII. One consideration for this practice is with the
same disclosures Web sites make when
collecting an email address and an additional disclosure in the utilization of
cookies. Specifically, many Web sites —
when collecting an email address — reference whether or not the information
will be shared with third parties. In most
cases, the company will indicate that it
does not share email addresses. The
same no-sharing language can easily be
stated for the use of cookies and their
“If consumers are to
better understand
the value of cookies,
then Web site owners
must correlate the
value of the cookie
with the services
rendered through
the Web site and in a
highly visible reference
point separated from
the privacy policy.”
first-party-only attributes. Reinforcing
the value of a cookie in conjunction with
PII privacy protections should further
dissuade cookie deletions.
Communicating Choice
In cases where cookie use value
propositions are not as clear, there is
always the option of communicating to
users their ability to exercise choice.
While most Web sites request choice
to be implemented through the browser
software, the process for this either
excludes cookies across their Web
activities or requires a more technical
understanding to apply preferences to
particular Web sites. As a result, one of
the most appropriate methods for Web
sites to consider is the creation of an
‘opt-out cookie.’
When the original authors developed cookies, they enabled an option
for a cookie to be referenced which
would indicate a users’ preference to
disable online behavioral tracking. While
this still requires a cookie to be placed
and referenced, the fact is an opt-out
cookie can easily be offered by any Web
site analytics program or advertising
network. One industry leadership effort
which exemplifies this use of choice is
with the Network Advertising Initiative
and its online advertising network
opt-out cookie management process.
If a Web site requires a cookie to
be referenced in order to function,
then at a minimum that Web site
should disclose whether behavioral
information could be shared with a third
party, and perhaps offer an option to
disable such information-sharing. The
most relevant example is a publisher
who requires a profile and cookie
reference for their own advertising
uses, yet also works with a third-party
advertising network that may offer an
opt-out cookie of their own.
Educate and Disclose All Policies
and Practices
A final consideration is the cookie
and behavioral tracking disclosures in a
privacy policy. All too often, the information about cookies is buried toward the
bottom of the policy and is a simple
THE PRIVACY ADVISOR
definition of what a cookie does and
whether or not there is PII correlated
with its use. As the many uses of cookies have evolved, so should their related
disclosures in Web site privacy policies.
One consideration is adding a shortform privacy policy landing page. This is
not to replace the existing privacy policy,
but rather compliment the extensive
nature of an existing policy with an easily navigable list of data collections and
uses. The short form could separate
anonymous from identifiable information
collection and uses, and easily disclose
cookie and other online behavior
methodologies in either or both categories. Again, a further delineation of
Web site owner vs. third-party uses
would also be a best practice, and could
be part of a corporate compliance
requirement under California’s SB 27
privacy law.
It is critical for a Web site to disclose whether cookies are correlated
with PII. Oftentimes, as was the case
with the government employees, Web
site owners may not know all of the
uses of cookies. For instance, if a Web
site also offers an email newsletter or
other email communication effort, it is
more than likely that a cookie will be utilized which can correlate with an identifiable email user. In instances such as
this, it is important that the correlation
be properly disclosed, especially if the
third party, such as an email service
provider, references the cookie.
If users are to continue enabling
persistent cookie uses in Web sites,
then the industry needs to increase
transparency through technology, value
propositions, choice and disclosures.
Only then can we have our cookies —
and perhaps eat them too.
Ben Isaacson, CIPP, serves as the
Privacy & Compliance Leader for
Experian & CheetahMail, overseeing all
interactive marketing policy and email
deliverability issues affecting
CheetahMail and Experian's diverse
marketing services client-base. He can
be reached at +714.830.7253 or
[email protected]
Special Message from the President
Year of the Vendor
I am both honored about assuming the presidency
of the IAPP and excited about where we are headed. The IAPP has come so far in the past few years.
My goal is to help the organization get to the next
level, because I truly believe that the IAPP’s success
will mirror the success of our profession.
A large part of the IAPP’s success to date can
be attributed to my predecessors, particularly Chris
Zoladz, our most immediate past president. Chris
was an extremely effective leader, and he capably
led the IAPP through several major organizational
and financial transitions during his two-year tenure.
I have learned a lot from him and appreciate his friendship. Luckily, Chris
will remain on the Executive Committee, so we will not be losing his
knowledge and advice.
As I look ahead this year, there are a number of issues that privacy pros
will be dealing with, including liability for the actions of third parties, managing
vendors and the increasing risk with all outsourced relationships, identity theft
and the tidal wave of data security breach legislation in the states and
Congress.
After six years, most of us have gotten our own houses in order. Our
programs are more or less mature and we are confident that we have a good
handle on everything under our corporation’s direct control. However, due
to the proliferation of breaches of data in the hands of third parties — not to
mention the sensitivity of the public and policymakers to the issue of
“outsourcing” — 2006 will likely become the “Year of the Vendor” for many
privacy professionals.
Federal and state regulators have taken a keen interest in the third
parties that private companies use to provide products and services to their
customers. Regulators expect us to ensure that data outside of our direct
control is still highly safeguarded. Third parties have the capability of inflicting
severe damage to a firm’s reputation and its bottom line due to damages and
lost customers. CardSystems Solutions is probably the poster child for why
companies need to make sure that their vendors’ operations and systems are
as secure as theirs, but the litany this past year of back up tapes “lost” by
trusted couriers and consultants whose laptops were stolen clearly proves
that risk can also come from less sophisticated processes. Even our trash has
its place in the hierarchy of privacy risk.
I look forward to leading the IAPP for the next year and working with
Trevor Hughes and his capable team. I also am interested in learning your
views and opinions about the IAPP, its services and where our profession and
the IAPP are heading. We want to continue building an organization that
evolves and meets the needs of our membership.
Kirk M. Herath,
President of the Board of Directors, IAPP
7
February • 2006
Ask the Privacy Expert
This is the first of a new monthly feature in The Privacy Advisor. We invite our readers
to submit questions to [email protected]. We will tap the expertise of IAPP
members to answer your questions.
Elise Berkower
Q
Under the FTC’s rule, “transactional or
Our company sells gourmet food
relationship” messages include those that,
gift baskets by catalog and at our
“[w]ith respect to a[n] … ongoing
Web site. Sometimes the gift
commercial relationship involving the
baskets contain wine, and someone over
ongoing … use by the recipient of
21 has to be available at the recipient’s
products or services offered by the
location to receive and sign for the wine
sender,” notify “of a change in the
(and the rest of the gift) when it is delivrecipient's standing or status ….” 16 CFR
ered. We ask the gift buyers to provide
§316.3(c)(3)(ii) Alerting a gift recipient to
the email addresses of the gift recipients.
the coming delivery of her/his gift and the
We would like to send emails to the gift
necessity for having someone of at least
recipients, advising them of the delivery
21 years of age available to accept the
date and approximate time so the gifts can
Elise Berkower
delivery could qualify as “[n]otification of
be properly delivered. Can these be
a change in the recipient's standing or
considered “transactional” emails under
status” in an “ongoing commercial relationship involving
CAN-SPAM, if they contain no promotional material, even
the ongoing use by the recipient of products and services
though it was not the gift recipient that entered into the
offered by the sender.”
transaction with us?
Please note that there are currently two states (Utah
and
Michigan)
that have laws that basically create “Do Not
“Please note that there are currently two
Email” lists for children, and that alcoholic beverages are
states (Utah and Michigan) that have laws that
among the categories of products that should not be
basically create ‘Do Not Email’ lists for children, advertised in messages sent to email addresses on these
states’ registries. Although the constitutionality of the
and that alcoholic beverages are among the
Utah law is currently being challenged in federal court,
categories of products that should not be
the law remains in effect. You can find more information
advertised in messages sent to email addresses about these registries at www.utahkidsregistry.com/compliance.html (Utah) and www.protectmichild.com/complion these states’ registries.”
ance.html (Michigan).
A
Both the law and the rules promulgated by the
FTC would permit you to treat the emails notifying
the gift recipients of the impending delivery of
their gifts as “transactional or relationship” messages
even though the recipients themselves did not enter into
the transaction with you. (Please note that under CANSPAM, you could also treat such emails as unsolicited
commercial messages; this would require you to include in
the messages, among other things, a mechanism for the
recipient to be able to stop receiving promotional emails
from you. If you treated these messages as “commercial,”
and a subsequent buyer ordered a gift basket for a recipient that had previously asked not to receive any more
commercial messages from you, you would not be able to
send such delivery notifications to that recipient.)
8
This response represents the personal opinion of our
expert (and not that of his/her employer), and cannot be
considered to be legal advice. If you need legal advice on
the issues raised by this question, we recommend that
you seek legal guidance from an
attorney familiar with these laws.
Elise Berkower, CIPP, Senior Privacy Compliance Officer,
DoubleClick Inc., was this month’s featured expert.
Berkower is responsible for issues of privacy compliance
for the New York-based company, a leading provider of
digital advertising technology and services. Berkower also
is a member of The Privacy Advisor’s Advisory Board.
THE PRIVACY ADVISOR
Prohibiting Porn in Your Workplace is not Enough: New Jersey
Court of Appeals Imposes New Duties on Employers who
Engage in Electronic Monitoring
Philip L. Gordon, Esq.
n a precedent-setting decision, the
New Jersey Court of Appeals held on
the eve of 2006 that employers have a
duty to uncover and stop an employee’s
use of corporate electronic resources for
child-porn activities once the employer
knows, or should know, that an employee is accessing adult pornography. The
court’s holding represents a new highwater mark for the right of employers to
engage in workplace surveillance of
employee email and Internet use. With
this right, however, comes concomitant
responsibilities, and an employer’s failure
to fulfill those responsibilities could support a negligence action against the
employer by the victims of an employee’s criminal conduct.
I
Company Had Notice of
Porn-Surfing but Failed to Act
The case, captioned, Doe v. XYC
Corp. (Doe v. XYC Corp., N.J. Super. Ct.
App. Div., No. A-2909-04T2, 2005 N.J.
Super. LEXIS 377, Dec. 27, 2005), to
preserve the anonymity of the parties,
involved allegations by the plaintiff that
an XYC employee — who was her exhusband and the stepfather of her 10year-old daughter — had molested her
daughter at home, taken pictures of the
child partially clad and naked, and transmitted those photographs to child
pornography Web sites, using XYC’s
computer resources. Rather than suing
her ex-husband, the woman claimed that
XYC was negligent for failing to uncover
and stop its employee’s alleged unlawful
conduct and, therefore, XYC should be
held liable for harm to the child.
Between 1999 and the employee’s
arrest in June 2001, XYC was on notice
that the employee was viewing pornography. IT personnel reviewing computer
logs noted that the man had accessed
URLs which suggested adult porno-
graphic sites. A co-worker
the appropriate law
complained to her supervienforcement authorities;
sor that the man — who
and to take effective interworked in a cubicle that
nal action to stop the
was open to public view
employee from accessing
— often blocked or minichild porn at work.
mized his computer screen
The Court of Appeals
when she walked up to
rejected XYC’s assertion
him. XYC’s Director of
that its respect for the
Network and Personal
employee’s privacy rights
Computing Services
justified its failure to invesobserved URLs, reflecting
tigate further. In reaching
Philip L. Gordon, Esq.
adult pornographic sites,
this conclusion, the court
stored in the browser on
relied heavily on XYC’s
his desktop. His direct supervisor made
electronic resources policy, which stated
the same observation and also noted
that all emails created using the compathat one of the sites was called,
ny’s computer system, were XYC’s prop“Teenflirts.org: The Original Non-nude
erty, that emails were not private, and
Teen Index.”
XYC reserved the right to review, audit
Despite these observations, no one
and access the email. The court also
at XYC visited any of the apparently
noted that the policy restricted Internet
pornographic Web sites to check their
access to business purposes only and
content. No one at XYC used the
required employees to report improper
monitoring software that the company
uses of the Internet to the personnel
possessed to more closely examine his
department. Putting aside the policy, the
Web surfing activities. While XYC did
court also found that the employee had
reprimand the employee on two
no privacy interest in his email and
occasions, the company took no further
Internet activity because his cubicle did
disciplinary action after he appeared to
not have a door and was openly visible
stop his porn-viewing activities.
from a hallway.
The Court of Appeals also rejected
The Court of Appeals’ Reasoning
XYC’s argument that the company could
The Court of Appeals found that
not be held responsible for the employXYC “through its supervisory/manageee’s viewing of child pornography
ment personnel, was on notice that
because that conduct was outside the
Employee was viewing pornography on
scope of his employment. The court
his computer and, indeed, that this
invoked the rule that an employer can be
included child pornography.” Given that
held responsible for damages caused by
possession of child pornography is a
an employee’s criminal conduct when
felony under federal and New Jersey
the employee engages in the conduct on
law, the court had little difficulty reaching
the employer’s premises, using the
the conclusion that XYC’s management
employer’s equipment, and the employer
could not turn a blind eye to the employhas the ability to control the conduct and
ee’s alleged criminal conduct. Instead,
knows or should know that there is a
the court ruled, XYC had a duty to investigate further; to report his activities to
See Electronic Monitoring, page 10
9
February • 2006
Electronic Monitoring
continued from page 9
reason for exercising such control. The
facts of the XYC case fell squarely within
this four-part test.
Implications of the XYC Case for
Employers
Read broadly, the Court of Appeals’
decision, if followed in other jurisdictions, opens the door to a whole new
genre of litigation holding employers
responsible for damages arising from the
criminal conduct of their employees.
Only one element of the four-part test
can even be disputed when an employee engages in criminal conduct using her
employer’s electronic resources, i.e.,
whether the employer knew, or should
have known, of the need to stop the
conduct. However, many employers will
face difficulty defeating this element.
According to a 2005 survey of the
American Management Association, 80
percent of employers monitor their
employees’ email and Internet use. As
the XYC case itself reflects, even the
most minimalist monitoring — checking
URLs listed on computer logs or in the
history folder of an employee’s desktop
browser — could generate sufficient
information to be considered notice to
the employer of the need to exercise
control over the employee’s use of its
computer resources.
“Read broadly, the Court
of Appeals’ decision,
if followed in other
jurisdictions, opens the
door to a whole new
genre of litigation
holding employers
responsible for
damages arising from
the criminal conduct of
their employees.”
10
The Court of Appeals’ opinion is
especially troubling for employers who
monitor employee communications
because the decision strongly suggests
that lawful Internet conduct can constitute sufficient notice of an employer’s
need to act. In concluding that XYC had
sufficient notice of the employee’s activities to impose a duty on XYC to act, the
Court of Appeals relied almost exclusively
on his lawful (albeit inappropriate) viewing of adult pornography. Only one of the
many pornographic Web sites he visited
possibly suggested child pornography
and that Web site was ambiguous, referring to teens and “non-nude” photographs. Viewed from this perspective, the
XYC case arguably provides a foundation
for a lawsuit against an employer by the
victims of a terrorist attack if the employer’s monitoring software reveals that an
employee used corporate electronic
resources to visit a bomb-making Web
site. As another example, an employer
could be held responsible when monitoring software reveals that an employee
used corporate electronic resources to
engage in online shopping, using someone else’s identity. The case might even
provide legal precedent for imposing liability on employers whose employees
download copyrighted songs or videos, if
management is aware that the employee
visited file-sharing sites or blogs, potentially extending to situations where such
material is received via email.
While the XYC case does not
expressly impose on employers a duty
to monitor their employees’ email and
Internet traffic, the case strongly suggests that the large majority of employers who do monitor email and Internet
use must actively review, and, when
necessary, act upon information
obtained through the monitoring program. In the XYC case, the appeals court
determined that it was reasonable to
impose on XYC duties to investigate further and stop the employee’s child
pornographic activities based in part on
the company’s possession of monitoring
software that was capable of tracking his
email and Internet use. The fact that the
company had not implemented the software provided no defense. Similarly, the
“While the XYC case does
not expressly impose on
employers a duty to
monitor their employees’ email and Internet
traffic, the case strongly
suggests that the large
majority of employers
who do monitor email
and Internet use must
actively review, and,
when necessary, act
upon information
obtained through the
monitoring program.”
appeals court chastised XYC for not
opening Web sites visited when the
URLs stored in computer logs and the
browser’s memory suggested pornographic activity. The court also reasoned
that the employer gained notice of
potentially harmful activities when coworkers complained of suspicious cubicle conduct that may have presaged
nothing more than playing computer solitaire. In other words, employers can not
defend against a negligence claim similar
to that asserted in the XYC case by arguing that they did not uncover unlawful
activity because they failed to actively
use their monitoring capabilities.
The XYC case provides yet another
reminder for employers of the importance of adopting and enforcing an effective electronic resources policy.
Following a line of cases, the New
Jersey Court of Appeals unambiguously
held that XYC’s electronic resources policy defeated the employee’s purported
interests in the privacy of his email and
Internet activities. At the same time, the
court emphasized that the failure of sev-
See Electronic Monitoring, page 12
Privacy Advice #71
Bad penmanship is not an
effective encryption solution.
Ernst & Young’s Privacy
Assurance & Advisory
Services will help you
develop appropriate
privacy policies, controls,
and compliance programs.
ey.com/privacy
Audit • Tax • Transaction Advisory Services
© 2006 ERNST & YOUNG LLP
February • 2006
Electronic Monitoring
continued from page 10
eral managers to report the employee’s
improper conduct to the personnel
department, as the policy required, supported a finding of negligence.
Even if the XYC case ultimately is
read narrowly to impose duties only
when employers are on notice that an
employee is using corporate resources
to view pornography, the case still will
have significant ramifications for employers. A variety of statistics and anecdotal
evidence suggest that viewing erotica at
work is commonplace: 70 percent of
porn is downloaded between 9 a.m. and
5 p.m., according to the porn industry
group SexTracker. Internet Filter Review
reported that 20 percent of men and 13
percent of women surveyed had admitted to accessing pornography at work. A
major U.S. computer manufacturer discovered after installing monitoring software that several employees had visited
more than 1,000 sexually oriented sites
in less than one month.
Finally, employers must tread with
caution when fulfilling their newly minted duty to investigate possible child
pornographic activities. Employers
should warn the employees involved in
the investigation, as well as any involved
in routine monitoring, to avoid accessing
the child pornography themselves so
that these employees do not expose
themselves to possible criminal prosecution for viewing child pornography.
Employers who learn that an employee
has accessed child pornography using
corporate resources should immediately
contact local law enforcement authorities and the FBI. In addition, the suspect
computer should be isolated to avoid the
possible destruction of material evidence
and to prevent any other employees
from viewing the child pornography.
Conclusion
Monitoring employee email and
Internet use can be a double-edged
sword. While the surveillance permits
employers to prevent abuse of
corporate electronic resources, it also
opens the door to claims against
employers by those who are injured
when an employee engages in criminal
conduct using corporate electronic
resources. To reduce the risk of such
liability, employers should implement
policies and procedures to ensure that
the fruits of their electronic monitoring
are routinely reviewed and that the audit
results in further investigation and
disciplinary action, if necessary, when
the monitoring reveals potentially
unlawful conduct.
Philip L. Gordon is a shareholder in the
Denver office of Littler Mendelson, P.C.
He is an employment litigator with a
specialty in workplace privacy and data
security issues. He can be reached at
[email protected] or +303.362.2858.
TO MISS IT WOULD BE A
SECURITY LAPSE
Privacy and security law is rapidly evolving.
To keep up, read the
DWT Privacy & Security Law blog:
www.privsecblog.com
Lawyers
Toll Free
1-877-398-8417
www.dwt.com
A N C H O R AG E
12
■
BELLEVUE
■
LO S A N G E L E S
■
N E W YO R K
■
PORTLAND
■
S A N F R A N C I S CO
■
S E AT T L E
■
SHANGHAI
■
© 2006 Davis Wright Tremaine LLP.
All rights reserved.
WA S H I N G TO N D. C .
THE PRIVACY ADVISOR
An Interview with Dr. David Brailer,
IAPP National Summit 2006 Keynote Speaker
Noted healthcare information expert Dr. David J. Brailer discusses his experience with
health information technology as well as the recent imperatives in electronic healthcare
records. See Dr. Brailer speak in person at the IAPP National Summit 2006, March 8-10, in
Washington, D.C.
The Privacy Advisor (TPA): Can you
describe your mandate from President
Bush regarding the widespread deployment of health information technology?
Dr. Brailer: It comes down to four
things. Doctors should have electronic
health records so that they can have the
ability to order the appropriate tests;
prescribe without errors; get information
about patients in real time; and have
personal health records available to
every member of the public. Our sense
is that these information tools in the
hands of doctors are powerful. But putting them into the hands of consumers
is really a breakthrough. All of our work
is organized around these four components.
TPA: What are the benefits of creating a
nationwide e-health records system?
Dr. Brailer: They’re big. Many people
believe that more than 100,000 people
die every year from medical errors and
another 100,000 die from preventable
infections every year in hospitals and
nursing homes. Physicians using computerized order entry can know whether
two drugs have a dangerous interaction.
A lot of people die because they are taking one drug and the doctor gives them
another one, and they have a fatal reaction to that. It cuts the death rate way
down. Secondly, we do way too many
procedures on people — often because
we don’t know what somebody’s lab
result was, and so we do it over. We
see a lot of duplicative tasks and a lot of
unnecessary hospital admissions. The
third benefit is that it’s a much lower
tals and doctors collabohassle for the consumer
rate and co- invest in
and they are in control.
health IT. The whole goal
They don’t have to fill
is to have information
out the same paperwork
that is patient-centric so
time after time after
that we can know what
time. Let’s say they
is really going on with
have an abnormal mamthe patient. The estimogram. They can find
mate is, on average, it
out about it at the same
costs doctors $30,000 a
time as the doctor does.
year to have an elecIndependent
tronic health records
experts have published
system in place. While
papers that have put the
Dr. David Brailer
government funds will
savings at somewhere
support the developbetween $100 billion
ment of a certification process, we don’t
and $300 billion a year. There’s a lot of
want the government to pay for the
waste and inefficiency, and I think most
(system) because using tax dollars is a
people believe — and I certainly do —
very inefficient way to do this. We want
that the first $100 billion will be very
these processes to become self-sustaineasy to get.
ing so that we have a functioning marketplace for health information
TPA: Many doctors' offices have yet to
exchange.
adapt to the electronic medical records
system, citing the high cost of converTPA: Will Congress need to pass
sion. What is the proposed cost of a
legislation to create this system?
nationwide system and who will
assume those costs?
Dr. Brailer: Right now we are acting as
if Congress doesn’t need to act. The
Dr. Brailer: We're not going to have a
president started this through an execugovernment-run system, first of all. We
tive order. There’s going to come a time
want to help doctors make their choice
when there will be legislative changes.
of the right system. We are providing a
One of the areas is going to be in privacertification process that helps them
cy and security because the privacy
buy the right product and it helps them
rules that we have today are not really
lower cost. There are certain incentives
designed for the electronic era of health
for doctors to use electronic health
care information. So there are a lot of
records through pay-for-performance
gaps. I’ve got a group that’s coming
based on their patient's health status
together. We’ve got to understand what
rather than just paying a doctor to see a
the policy changes are and it may
patient. That gives them a big incentive
for health IT. Thirdly, we are pursuing
See Dr. Brailer Interview, page 14
some policy changes that will let hospi13
February • 2006
Dr. Bailer Interview
continued from page 13
include statutory changes at some
point.
TPA: You are one of the IAPP's keynote
speakers for the IAPP National Summit
2006. Can you preview what you plan to
talk about before the gathering of privacy
pros in Washington, D.C.?
Dr. Brailer: Simply put, I think privacy
professionals largely speaking, are still
fighting an old battle — and that’s not to
say those battles aren’t worth fighting.
The HIPAA rules raised a lot of issues
that are still being fought about. But
everyone is still so focused on looking
back at old fights. We need the privacy
industry at the table to start moving forward — to really begin thinking about
what the world looks like. It will take
years to address some of these policies
and laws. We're opening a whole new
era of opportunity and issues that really
need to be discussed — and I'm going
to be calling on your group to help us
think about them.
David J. Brailer, M.D., PhD., was appointed the first National Health Information
Technology Coordinator by Health and
Human Services Secretary Tommy G.
Thompson on May 6, 2004. Dr. Brailer's
duties as National Coordinator are to
execute the actions in President George
W. Bush's Executive Order, issued on
April 27, 2004, which called for widespread deployment of health information
technology within 10 years. Dr. Brailer
holds doctoral degrees in both medicine
and economics. He is a recognized
leader in the strategy and financing of
quality and efficiency in healthcare, with
a particular emphasis in health information technology and health systems management.
Dr. Brailer will appear as the closing
keynote speaker at the IAPP National
Summit 2006 on Friday, March 10. Don't
miss the opportunity to see this exciting
presentation — and become part of the
largest privacy gathering of the year!
14
Close Up On…
Child Registry, Data Security, RFID Bills
Dominate State Legislative Agendas
Overview
The following 38 legislatures convened their 2006 sessions in January:
Alabama, Alaska, Arizona, California,
Colorado, Delaware, District of
Columbia, Georgia, Hawaii, Idaho,
Illinois, Indiana, Iowa, Kansas,
Kentucky, Maine, Maryland,
Massachusetts, Michigan,
Mississippi, Missouri, Nebraska,
New Hampshire, New Jersey,
New Mexico, New York, Ohio,
Pennsylvania, Rhode Island, South
Carolina, South Dakota, Tennessee,
Utah, Vermont, Virginia, Washington,
West Virginia and Wisconsin.
Connecticut and Oklahoma are
scheduled to convene during the first
two weeks in February. Although the
Florida Legislature is not scheduled to
officially convene its regular session
until March 7, committees have been
meeting to discuss and advance
specific bills since late 2005.
No-Spam List/Child Registries
Georgia and Illinois are the latest
states considering bills that would
establish a so-called “child protection
do-not email registry” despite the
Federal Trade Commission (FTC)
conclusions that lists of children's
email addresses could be vulnerable
to pedophiles.
The sponsors of Georgia SB 425
and Illinois HB 572 say they want to
use the registries as a way to stop
spammers from “bombarding children
with inappropriate adult content.” The
bills would require the state to set up
a registry whereby parents and
schools could register children's emails
as a way to ensure that the content
they receive is appropriate and legal
for their age. The bills are similar to
those enacted
in Utah and
Michigan last
year.
In November
of 2005, the FTC
warned lawmakers in Illinois that
“because such a
registry cannot
Emily Hackett
be effectively
monitored for
abuse, it may have the unintended
consequence of providing spammers
with a mechanism for verifying the
validity of email addresses." The FTC
went on to say that "this consequence
may actually increase the amount of
spam sent to registered children's
addresses in general, including spam
containing adult content."
The Georgia bill would allow individuals to sue violators for $5,000 per
email, up to $250,000 for each day the
violation occurs. It also would make
sending email to registered addresses
a felony punishable by up to five years
in prison and maximum fines of
$200,000.
Already in Utah and Michigan,
marketers pay to submit their marketing lists to the state. The lists are then
compared with the state registry and
email addresses contained on the
state registry are removed. Utah
currently charges $5 per thousand
addresses screened. Michigan charges
$7. Marketers could pay as much as
$10 per thousand addresses under the
Georgia bill, which proposes a ceiling
of one-cent per email. It is unclear
what the Illinois bill would charge.
The child registry bills are being
pushed by Unspam, the company that
was hired to manage the registries for
THE PRIVACY ADVISOR
Utah and Michigan. Unspam also
is attempting to get bills introduced
in California, Connecticut and
New York.
The Free Speech Coalition sued
Utah last November claiming its
registry law violates the Can-Spam act,
which overrides state anti-spam laws.
The group also claims that Utah's law
unconstitutionally interferes with
interstate commerce. The group also is
expected to sue Michigan.
RFID
The Washington House
Technology, Energy and
Communications Committee held a
hearing but took no action this month
on HB 2521, a bill proposing to ban
identification documents from
containing a “contactless integrated
circuit or other device that can
broadcast personal information or
enable personal information to be
scanned remotely.”
The bill defines "identification
document" as a driver’s license,
employee identification, health insurance and library cards. The bill also
allows a person to file a lawsuit against
anyone using radio waves to remotely
scan their identity without their
knowledge. The person could seek
actual damages, including damages for
mental pain and suffering, liquidated
damages computed at the rate of $100
per day for each violation (capped at
$1,000). The bill is similar to legislation
pending in California.
The Washington Department of
Transportation, AEA, and the
Washington Food/Retail Association all
testified against the bill.
So far this year there are 17 bills
pending in nine states that propose to
restrict or ban the use of RFID technology: Alabama, Florida, Illinois,
Massachusetts, Missouri, New
Hampshire, New York, Tennessee and
Washington.
“So far this year there are 17
bills pending in nine states
that propose to restrict or ban
the use of RFID technology:
Alabama, Florida, Illinois,
Massachusetts, Missouri, New
Hampshire, New York,
Tennessee and Washington.”
Spyware
Legislators in the Hawaii House
and Senate introduced bills proposing
very different solutions to spyware. HB
2256, introduced by Rep. Alex Sonson,
D-Honolulu, is modeled after the
California deceptive intent law and SB
2019, introduced by Sen. Shan
Tsutsuis, D-Maui, is a hybrid
spyware/adware bill containing language from the California law, and
bills pending in Michigan and
Congress.
HB 2019 would make it illegal to
knowingly distribute adware or spyware to a user’s computer that would
deceptively collect personal information, alter software settings, record key
strokes or open multiple, sequential or
stand-alone ads. Violators could be subject to a fine of $100,000 per offense
and/or a 10-year prison sentence.
Bills proposing new spyware laws
or amending existing laws are pending
in 18 states: California, Delaware,
Hawaii, Iowa, Illinois, Kansas,
Massachusetts, Maryland, Michigan,
Missouri, Nebraska, New York,
Oklahoma, Pennsylvania, Rhode
Island, Tennessee, Virginia and
Vermont.
Data Security
The Vermont Senate Finance
Committee advanced SB 284, a data
security notification bill that also proposes to regulate the use of Social
Security numbers and document
destruction. The bill would require businesses to notify customers when their
personally identifiable information has
been breached. The bill would require
specific notification requirements.
A customer notice would not be
required if the business decides that
the misuse of the personal information
is not reasonably possible.
However, the business would then
have to justify to the Attorney General
each time it decides a notice is not
necessary.
The Indiana Public Safety and
Homeland Security Committee passed
HB 1101, a data security notification bill
that also regulates disposal of unencrypted, unredacted personal information. The bill would permit the
Consumer Protection Division to establish and maintain a program to officially
notify a consumer credit reporting
agency that a person has been the victim of identity deception.
So far this year 23 states are considering bills that propose restrictions
that go beyond the California data
security law passed last year: Alaska,
Alabama, Arizona, DC, Delaware,
Georgia, Hawaii, Illinois,
Massachusetts, Maryland, Michigan,
Minnesota, Missouri, Nebraska, New
Hampshire, New Jersey,
Pennsylvania, South Carolina, Utah,
Virginia, Vermont, Wisconsin and
Wyoming.
Emily Hackett is Executive Director of
the Internet Alliance, the leading
Internet trade association operating in
the states. The IA represents a broad
spectrum of Internet users, including
marketers, content providers, ISPs and
consumers. She can be reached at
+202.861.2476 or by email at
[email protected].
15
February • 2006
Using Privacy Enhancing Technologies (PET)
for Compliance and Value Creation
Steve Kenny
What is PET?
The origin of PET can be traced
back to initiatives from the Dutch Data
Protection Authority and the Ontario
Privacy Commissioner in the mid-1990s.
The insights gained — that technology
could be used to represent the concept
of privacy — resonated in the late 1990s
with a select group of small companies
such as Zero Knowledge Systems.
These companies associated privacy
with anonymity by aligning politically liberal ideology, emergence of the Internet
and astonishing cryptology. However,
these initial PET types also failed to
address principle areas such as
terabyte-sized back-office databases.
Today, anonymity arguably is dead.
PET — in its most intuitive sense —
concerns the use of technology to create — or at least strengthen —‘privacy.’
Presently, privacy is understood by
some companies as a strategic, intangible asset. The asset is created by information management practices derived
from law, ethics and consumer behavior,
and defined by the values of a legal
entity processing personally identifiable
information. Those values are set out in
a company’s privacy policy and
demonstrated by the attestation to its
provisions. Today, PET can be best
described as the creative use of
technologies to manage privacy policy
requirements in light of a company’s
business drivers, principles and market
positioning.
How does PET relate to
Privacy Risk?
Technology choices invariably have a
manifest impact upon an organization’s
management of privacy risk because IT
systems process personal data. The
implication is that different technologies
have different impacts on an organization’s privacy compliance and strategic
risk positions. While some technologies
16
These are CEO-relevant
are privacy-enhancing, such
issues that privacy
as anonymous knowledge
professionals need to
discovery, others are privaembrace and then
cy-neutral. Still others, such
demonstrate the value to
as ‘spyware,’ can actually
CIOs and CMOs to counter
destroy privacy trust and
the perception of their role
cannibalize value. In Europe,
as the privacy police agent.
the implications go a step
further, as it is the technoloConclusions
gy deployer rather than the
Steve Kenny
While it is fair to say
technology provider or
that privacy technology must be
integrator that is accountable for privacy
considered in an integrated fashion with
compliance.
procedural process and governance, it
For organizations grappling with
is also fair to say that PET can directly
privacy as a strategic asset, the implicaaffect an organization’s management of
tions on the buy-side of technology can
privacy risk.
be immense. The attainment of compliWhen companies source software
ance and strategic privacy objectives
and services, competing solutions
can be partly determined by technology
provide differing degrees of alignment to
choices and the capability to integrate
privacy compliance and strategic objecand control those choices. As such, PET
tives. Technology buy-side organizations
has a direct and primary relationship to
must develop the skills to ascertain the
privacy risk.
differing privacy implications of competing choices, and how those implications
What are the potential
benefits of PET?
relate to other decision drivers, such as
Some organizations understand that
cost and functionality.
privacy is a strategic opportunity as well
as a compliance issue. Considering technology as a tool to help achieve compliSteve Kenny is Privacy Services Leader
ance and facilitate realization of strategic for KPMG in the U.K. KPMG is the
opportunities are starting points for
global network of professional services
demonstrating PET’s potential benefits.
firms that provide audit, tax and
From a compliance perspective,
advisory services. KPMG LLP operates
information governance determines an
from 22 offices across the U.K. with
organization’s policy conformance, and
more than 9,000 partners and staff.
technology plays an essential role. PET
He has previously worked as a PET
yields the promise of radical increases
specialist for the Dutch Data Protection
in the level of compliance and public
Authority and for European Commission.
confidence in the organization. PET can
Kenny is also co-chair of the IAPP
be used to catalyze business models
Benelux KnowledgeNet chapter.
that are stifled seemingly by legislation,
regulation and policy rules. It allows
If you wish to receive a copy of a
companies to achieve and improve
KPMG white paper please on PET
compliance to allow business models to
please contact:
realize their full potential. PET not only
UK: [email protected]
makes ROI happen, but can be a tool to
NL: [email protected]
actually define strategic opportunities.
USA: [email protected]
THE PRIVACY ADVISOR
February • 2006
Web Watch
What’s Ahead for Privacy and Security? Top Predictions for 2006
Michael Weider
Introduction of the PCI
omputer and industry
Data Standard - The
experts alike called 2005
onslaught of highly publithe worst year ever for
cized online breaches and
known privacy and security
identity theft scams
data breaches. According to
prompted credit card commedia reports, there were at
panies to insist on measleast 130 reported breaches
ures to help ensure the
in 2005 that exposed more
security and privacy of their
than 55 million Americans to
members’ confidential inforpotential ID theft. In fact, an
mation and comply with the
adviser for the Treasury
Michael Weider
Payment Card Industry (PCI)
Department's Office of
Data Security Standards, which offer a
Technical Assistance estimated that
single approach to safeguarding sensicybercrime proceeds in 2004 were $105
tive data for all card brands. Failure to
billion, greater than those of illegal
comply with these security standards
drug sales.
may result in fines, restrictions or
Highlighted in this article are trends
permanent expulsion from card
and events we thought raised the bar
acceptance programs.
for public awareness, shaped the
security and privacy compliance market
Phishing Attacks Soared - Phishing
in 2005 and what we can expect to see
attacks reached a new high at the end
more of in 2006.
of 2005 after growing steadily all year.
According to reports the number of
Landmark Cases Driving Change brands targeted also increased by nearly
2005 saw some very public and
50 percent over the course of 2005,
landmark privacy and security cases,
from 64 to 93. And attacks are becomincluding BJ's Wholesale Club Inc.
ing increasingly sophisticated with a
reaching a settlement with the Federal
quarter of all phishing Web sites hosting
Trade Commission. Under the settlekeylogging malicious software.
ment, BJ's agreed to “implement a
Meanwhile, phishing attacks
comprehensive data-security system
reached a new high at the end of 2005
and undergo bi-annual security audits
after growing steadily all year, according
for the next 20 years.”
to a new study. The number of unique
email-based fraud attacks detected in
Growth of Disclosure Laws November 2005 was 16,882, almost
The ChoicePoint breach that affected
double the 8,975 attacks launched in
more than 140,000 people in early
November 2004.
2005 prompted other states to follow
suit with legislation similar to
Privacy Became a Key Driver for
California’s Senate Bill 1386 (SB 1386),
Businesses - 2005 illustrated what
the Security Breach Information Act.
businesses have been talking about for
SB 1386 mandates public disclosure of
a long time — that trust is a vital
computer-security breaches in which
component in customer loyalty and
confidential information of any
brand strength. Several surveys and
California resident may have been
reports highlighted that it only takes a
compromised.
C
18
single privacy or security breach to
destroy the customer relationship.
What’s in store for 2006? In a
Computerworld survey of more than
300 IT executives, security initiatives
ranked above all other project priorities
for 2006. A recent survey also estimated that total costs to recover from a
data breach averaged $14 million per
company. Given the growing privacy and
security challenges facing companies,
there are likely many more breaches to
come this year.
Compliance Will Continue to Drive
Security Spend - The growing number
of global regulations — and the consequences of not complying with them —
will continue to encourage companies
to invest in security software that will
help ensure they are in compliance with
new legislation. However, the focus of
spending strategies will likely shift from
just getting compliant to doing so more
efficiently. Using technology and
automation to drive down the cost of
compliance will be an important focus.
Increased Awareness of Internal
Security and Privacy Risk - Despite the
serious risk of unauthorized employee
access to confidential internal files,
most companies spend a fraction of the
security and privacy resources on their
internal Achilles heel, the intranet.
Intranets have grown to be thousands
and even millions of pages distributed
globally, and given their size and scope,
face similar risk and compliance challenges of public facing sites. It is imperative that internal data be properly managed and protected.
Two-Factor Authentication Will
Become More Mainstream - Banks in
the United States are working to imple-
THE PRIVACY ADVISOR
Privacy News
ment two-factor authentication by the
end of this year in which users must
enter two forms of identification to
access their banking details.
Motivation to implement two-factor
systems will be driven by regulatory
needs but also by the increased trend
to make security a differentiator for
winning business.
Application-level Vulnerabilities
Will Grow - Using past years as a
baseline, security threats show no
sign of slowing down and will likely
multiply in the coming year as more
hackers become proficient. Attacks
will be more complex, hit faster and
with less warning. A dangerous new
attack called “spear phishing” is on
the horizon, and there will likely be
even more attacks against a new
range of applications, including new
uses for cross-site scripting, SQL
injection as a way for traditional and
Web-based worms to help execute
phishing and other attacks.
Security and privacy will continue
to feature prominently on the compliance landscape in 2006. Although
online adoption may not slow down,
breaches will continue to erode trust in
the Internet and expose organizations
to significant fines, customer churn
and severe brand erosion if they aren’t
proactively addressed. Smart organizations will get ahead of the competition
by making security a differentiator
versus a cost of doing business.
Michael Weider is the founder and
chief technology officer of Watchfire.
Founding Watchfire in 1996, Weider
has led the company to a leadership
position in the online risk and
compliance management software
market. As chief technology officer,
he is responsible for product strategy,
engineering, technical support and
customer service.
IAPP Board Member Barbara Lawler
Leaves HP for New Privacy Post
he IAPP congratulates Board Member Barbara Lawler,
who recently became Intuit’s first Chief Privacy Officer.
Lawler, who most recently served as HP’s Chief Privacy
Officer after a 24-year career with the company, said she
is thrilled to join Intuit, the makers of specialized financial
software for consumers, taxpayers and accounting
professionals. The California-based firm has more than 7,000
Barbara Lawler
employees with major offices in 13 states, offices in Canada
and the United Kingdom, as well as customers around the world.
“The company is truly committed to having a strategic privacy program,
starting with CEO Steve Bennett,” Lawler said.Lawler will be leading the
Intuit privacy team, and is responsible for setting privacy strategy, policy,
regulatory analysis and implementation to deliver the best experiences to
customers and employees.
T
Watchfire’s AppScan® Secures
Two Finalist Positions for the 2006
SC Magazine Awards
atchfire, a leading provider of software and services to automate
Web application security testing, will be recognized as a finalist
during the U.S. Awards ceremony at the RSA Conference on Feb. 14 at
the Fairmont in San Jose.
Watchfire’s AppScan® was selected as a finalist in two categories,
Best Enterprise Security Solution and Best SME Security solution. AppScan
scans Web applications within an organization’s infrastructure, tests for
security issues and provides actionable reports and recommendations.
“SC Magazine is one of the security industry’s leading publications and
is well respected by security professionals across North America, Europe
and Asia,” said Michael Weider, founder and CTO of Watchfire. “We are
extremely honored that its readers have recognized Watchfire’s AppScan as
a finalist in two categories. Web applications pose some of today’s most
serious security and compliance threats and are a critical component to
managing overall enterprise security. This recognition is further validation
that our Web application security testing solution AppScan is market leading
and is a testament to its ability to improve the ease and speed by which
users are able to understand, prioritize and remediate critical Web
application security issues.”
The SC Awards are the world’s leading awards program for the
information security industry, with more than 1,300 product and service
nominations from at least 330 competing companies globally. The SC
Awards program spans the U.S., Asia and the UK. The SC Awards are
composed of the Professional awards judged by a panel of the industry’s
top talents as well as the Reader Trust Technology Awards, voted on by SC
readers in each region and the SC Awards Council, a group of senior CSOs.
W
19
February • 2006
Calendar of Events
MARCH
APRIL
MAY
8-10 IAPP National Summit 2006
Omni Shoreham Hotel,
2500 Calvert Street NW
Washington, D.C. 20008
+202.234.0700
Register at www.privacyassociation.org.
9-11 NATIONAL HIPAA SUMMIT 12
Hyatt Regency Capitol Hill
400 New Jersey Avenue NW
Washington, D.C.
+202.737.1234
2-5
8
IAPP Certification Training
(CIPP and CIPP/G)
8 a.m. — 6 p.m. Eastern Time
Diplomat Room
10
CIPP and CIPP/G Exams
IAPP Certification Testing (CIPP/CIPP/G)
8 a.m. — 11 a.m. Eastern Time
Grand Ballroom
7
IAPP Certification Training
(CIPP and CIPP/G)
8 a.m. — 6 p.m. Eastern Time Hyatt
Regency Capitol Hill (Room TBD)
400 New Jersey Avenue NW
Washington, D.C.
7
IAPP Certification Testing
(CIPP and CIPP/G)
9 a.m. - 12 p.m. Eastern Time
Hyatt Regency Capitol Hill (Room TBD)
400 New Jersey Avenue NW
Washington, D.C.
The 16th Annual Conference
on Computers, Freedom and
Privacy
The theme is “Life, Liberty and
Digital Rights.”
L’Enfant Plaza Hotel
Washington, D.C.
More details and registration
information can be found at
www.cfp2006.org.
To list your privacy event in the The Privacy Advisor, email Ann E. Donlan at [email protected].
PRESORTED
FIRST CLASS
U.S. POSTAGE
PAID
E. HAMPSTEAD, N.H.
PERMIT NO. 65
20