Regulatory Full-Court Press on Phone Call Records The IAPP`s

Transcription

Regulatory Full-Court Press on Phone Call Records The IAPP`s
March 2006 • Volume 6 • Number 3
Editor: Kirk J. Nahra
Regulatory Full-Court Press on Phone Call Records
Amy E. Worlton
store call records — are
rotecting the privacy
facing a full-court press from
and security of call
government authorities.
records is the regulatory focus of the moment.
FCC Moves Toward
Congress, the Federal
Tougher Security Rules
Communications
This month, the FCC
Commission (FCC), the
launched a proceeding that
Federal Trade Commission
may result in tougher security
(FTC) and agencies of various
standards for call records kept
states are inquiring into
Amy E. Worlton
by telecom carriers, known as
alleged unauthorized access
Customer Proprietary Network
to personally identifiable call records.
Information (CPNI). CPNI includes data
Consequently, telecommunications carconcerning a subscriber's phone usage,
riers — the entities that collect and
P
The IAPP's National Summit 2006
Brings Together 800 Privacy Pros in
Washington, D.C.
Dynamic Keynote Speakers, Focused Session Programming,
and Largest-Ever Certification Testing Class Combine for a
Successful Event at the Omni
Ann E. Donlan
WASHINGTON, D.C. - Accolades continue to pour in after
800 privacy professionals joined the IAPP for our National
Summit 2006 — an event that drew attendees and speakers
from 11 countries and many different industry sectors.
“I had trouble deciding between the different sessions
— so many good ones to choose from,” remarked one IAPP
member. Added another attendee, “You did a great job. I’m
new to this genre, but not new to conferences. This conference was of the highest quality.”
See IAPP National Summit 2006, page 4
The IAPP welcomes its attendees to the IAPP National Summit 2006, March 8-10,
at the Omni Shoreham in Washington, D.C. The successful event drew 800 attendess
and speakers from 11 countries — the largest conference in the IAPP's 5-year history.
including incoming and outgoing calls.
In the case of wireless service, CPNI
also can include information about the
location of the individual end-user.
Section 222 of the Communications Act
protects individually identifiable CPNI by
generally prohibiting disclosure absent
customer consent.
In August 2005, the Electronic
Privacy Information Center (EPIC), a
non-profit advocacy organization, petitioned the FCC to investigate whether
See Cell Phone Records, page 3
This Month
J. Trevor Hughes on the Strategic
Partnership Between the U.S.
and Canada .....................................Page 2
Data Retention —
Implications for Business..................Page 8
Sidebar: New Data Retention
Rules in Europe.................................Page 10
Ask the Privacy Expert —
Harry Valetk ......................................Page 12
Interview: FTC’s New Division of
Privacy and Identity Protection.........Page 13
Viewpoint: Binding Corporate
Rules and the Bottom Line............... Page 15
IAPP in the News ............................Page 16
Privacy News .......................Page 17 and 18
Calendar of Events ...........................Page 19
March • 2006
THE PRIVACY ADVISOR
Notes from the Executive Director
Editor
Kirk J. Nahra
Wiley Rein & Fielding, LLP
[email protected]
+202.719.7335
P
Managing Editor
Ann E. Donlan
[email protected]
+207.351.1500 X109
The Privacy Advisor (ISSN: 1532-1509 )
is published monthly by the International
Association of Privacy Professionals and
distributed only to IAPP members.
ADVISORY BOARD
Elise Berkower, CIPP, Senior Privacy Compliance Officer,
DoubleClick Inc.
Keith P. Enright, Director, Customer Information
Management, Limited Brands, Inc.
Philip L. Gordon, Shareholder, Littler Mendelson, P.C.
Brian Hengesbaugh, Partner, Privacy/Information
Technology/E-Commerce, Baker & McKenzie LLP
Todd A. Hood, CIPP, Director, Regional Privacy,
The Americas, Pitney Bowes Inc.
Ben Isaacson, CIPP, Privacy & Compliance Leader,
Experian & CheetahMail
Jacqueline Klosek, CIPP, Senior Associate in the
Business Law Department and member of Intellectual
Property Group, Goodwin Procter LLP
Lydia E. Payne-Johnson, CIPP, Executive Director,
Chief Privacy Officer, Morgan Stanley
Billy J. Spears, CIPP/G
Harry A. Valetk, CIPP, Director, Privacy Online,
Entertainment Software Rating Board
To Join the IAPP, call:
+800.266.6501
Advertising and Sales, call:
+800.266.6501
Postmaster
Send address changes to:
IAPP
266 York Street
York, ME 03909
Subscription Price
The The Privacy Advisor is a benefit of
membership to the IAPP. Nonmember
subscriptions are a vailable at $199 per year.
Requests to Reprint
Ann E. Donlan
[email protected]
+207.351.1500 X109
Copyright 2006 by the International Association of
Privacy Professionals.
All rights reserved. Facsimile reproduction, including
photocopy or xerographic reproduction, is strictly
prohibited under copyright laws.
2
rivacy pros who attended the IAPP National Summit 2006
in March in Washington, D.C., were part of a notable
gathering of our international community. During three
intensive days that drew 800 privacy professionals, including
attendees and speakers from 11 countries, to the IAPP’s most
successful conference in our 5-year history, there was no doubt
that privacy is indeed a profession in our marketplace today. I
want to thank all of our attendees and speakers for your
continued support and dedication to the IAPP’s enduring
mission. One of the great strengths of our organization is the
involvement of committed privacy pros with vast experience, drawn from their work in
diverse industries.
Privacy and data security continue to be among the most urgent and relevant
global issues we face today.The information economy and other economic factors have
promoted global relationships among businesses in different countries, often leading to
legal and cultural conflicts that require solutions to avoid undermining the mutual
benefits derived from these essential relationships.
Nowhere is that more evident than the crucial bond between the U.S. and Canada.
We have shared a rich history as crucial trade partners — the largest trade relationship
in the world.The U.S. and Canada also are devoted allies, which is physically evident in
that we share the longest friendly and undefended border in the world.
As a Canadian living and working in the U.S., I’m looking forward to exploring
the global issues we face in the areas of data transfer and privacy protection as the IAPP
plans to hold our fall Academy Oct. 18-20 in Toronto. It is entirely fitting that the IAPP
would choose Canada to hold its first conference outside the U.S. A recent review of
clips in the IAPP’s daily email newsletter,The Daily Dashboard, clearly demonstrates
how entwined our goals are as privacy professionals confronting privacy and data
security challenges that permeate our border.
Consider the response to a high-profile story in Maclean’s, Canada’s weekly news
magazine, which exposed how easy it is to buy a consumer’s land-line and cell-phone
records online from a U.S. data broker — even if she is Jennifer Stoddart, Canada’s privacy commissioner.The U.S. media took note of the compelling phone records story, and
not long afterward, newspapers and TV stations on this side of the border were exposing
how quickly and easily they were able to buy telephone records online — including the
sensitive call records of law enforcement officers and even former General Wesley Clark.
The legislative response has been swift, with federal and state lawmakers considering bills
to ban the practice and criminalize efforts to fraudulently obtain the records to sell them.
Another recent example of our shared experience on these issues is the objections
generated by the collection of a fingerprint scan for law school applicants taking the
LSATs. Law school professors and others have expressed concern about the privacy
implications for Canadians whose personal information is held in the U.S. because of
powers afforded to authorities by the USA Patriot Act.
The U.S.-Canadian border is a physical manifestation of division. However, our
information economy makes that border largely invisible, highlighting that as privacy
professionals, we embrace similar approaches to data privacy. So please, mark your
calendars now to join us in Toronto, where attendees will again experience the IAPP’s
new networking, education and certification offerings, including a keynote address
from Canada’s federal Privacy Commissioner, Jennifer Stoddart.
J.Trevor Hughes
Executive Director
THE PRIVACY ADVISOR
Cell Phone Records
continued from page 1
telecom carriers are doing enough to
safeguard CPNI from unauthorized disclosure. EPIC presented evidence that
more than 40 Web sites sell CPNI
records, apparently without the consent
of persons who are the subjects of such
records. Some data brokers even
offered to track the location of wireless
phone users. EPIC alleged that Web
sites obtained such CPNI through
“pretexting,” the practice of falsely
representing one's identity to a carrier in
order to obtain a customer's records.
Carriers apparently require a Social
Security number, mother's maiden
name or date of birth as identification.
EPIC asserted that this practice actually
provides little security because unauthorized third parties easily can obtain such
identifiers. According to EPIC, private
investigators and data brokers could also
be obtaining CPNI by hacking customers‘ online accounts with carriers, or
receiving data from dishonest carrier
employees. Aside from the illegality of
unauthorized CPNI access in its own
right, unauthorized disclosures potentially could lead to identity theft, stalking,
industrial espionage and other violations
of privacy and security.
Coinciding with Congressional focus
on CPNI security, the FCC acted on
“Aside from the illegality
of unauthorized CPNI
access in its own right,
unauthorized
disclosures potentially
could lead to identity
theft, stalking, industrial
espionage and other
violations of privacy
and security.”
EPIC's petition in February 2006, releasing a Notice of Proposed Rulemaking
(NPRM). The Commission already regulates carriers‘ disclosures of CPNI. In
this proceeding, security and disclosure
requirements could be substantially
heightened, although the agency has
offered few specific proposals to date.
The FCC asked commenters to consider
EPIC's recommendations that:
• CPNI should be protected by a customer-selected password, rather than
common demographical data such as
Social Security number, date of birth
or mother's maiden name.
• Carriers should keep an audit trail
of CPNI access.
• Carriers should store CPNI in
encrypted form.
• Carriers should be required to give
the FCC and customers notice when
the security of CPNI may have been
breached.
• Carriers should be required to delete
or anonymize call record information
after it is no longer needed for billing
or dispute resolution purposes.
In addition, the Commission asks
whether subscribers should be notified,
perhaps at the phone number associated with the subscriber‘s account, before
their CPNI is disclosed and/or after any
release.
Moreover, the NPRM indicates the
FCC's willingness to re-examine settled
regulatory questions. For example, the
agency asks whether the existing
“opt-out regime” sufficiently protects
CPNI disclosed to a carrier‘s joint
venture partners, and whether a subscriber’s affirmative “opt-in” should
instead be required. Further, the
Commission discusses possible rules to
promote consumers‘ understanding of
current CPNI notices. Finally, the FCC
inquires whether CPNI rules should
apply to VoIP and Internet-based service
providers, although these entities have
never before been considered “telecom
carriers” under the CPNI statute.
266 York Street
York, ME 03909
Phone: +800.266.6501 or +207.351.1500
Fax: +207.351.1501
Email: [email protected]
The Privacy Advisor is the official monthly newsletter of the
International Association of Privacy Professionals. All active
association members automatically receive a subscription to
The Privacy Advisor as a membership benefit. For details
about joining IAPP, please use the above contact information.
BOARD OF DIRECTORS
President
Kirk M. Herath, CIPP/G, Chief Privacy Officer,
Associate General Counsel Nationwide Insurance
Companies, Columbus, Ohio
Vice President
Sandra R. Hughes, CIPP, Global Privacy Executive, Procter
& Gamble, Cincinnati, Ohio
Treasurer
Becky Burr, CIPP, Partner, Wilmer Cutler Pickering Hale
and Dorr LLP, Washington, D.C.
Secretary
Dale Skivington, CIPP, Chief Privacy Officer, Assistant
General Counsel, Eastman Kodak Co., Rochester, N.Y.
Past President
Chris Zoladz, CIPP, Vice President, Information Protection,
Marriott International, Bethesda, Md.
Executive Director
J. Trevor Hughes, CIPP, York, Maine
Jonathan D. Avila, Vice President – Counsel, Chief Privacy
Legal Officer, The Walt Disney Co., Burbank, Calif.
John Berard, CIPP, Managing Director,
Zeno Group, San Francisco, Calif.
Agnes Bundy Scanlan, Esq., CIPP, Counsel,
Goodwin Procter LLP, Boston, Mass.
Peter Cullen, CIPP, Chief Privacy Strategist,
Microsoft Corp., Redmond, Wash.
Dean Forbes, CIPP, Director, Corporate Privacy,
Schering-Plough Corp., Kenilworth, N.J.
Kimberly Gray, CIPP, Chief Privacy Officer,
Highmark, Inc., Pittsburgh, Pa.
Jean-Paul Hepp, CIPP, Corporate Privacy Officer,
Pfizer Inc., New York, N.Y.
David Hoffman, CIPP, Group Counsel and Director of
Privacy & Security, Intel Corp., Germany
Barbara Lawler, CIPP, Chief Privacy Officer, Intuit,
Mountain View, Calif.
Kirk Nahra, CIPP, Partner, Wiley Rein & Fielding LLP,
Washington, D.C.
Nuala O’Connor Kelly, CIPP/G, Chief Privacy Leader,
General Electric Company, Washington, D.C.
Harriet Pearson, CIPP/G, Vice President Corporate Affairs,
Chief Privacy Officer, IBM Corporation, Armonk, N.Y.
Jules Polonetsky, CIPP, Vice President,
Integrity Assurance America Online, Inc., Dulles, Va.
Lauren Steinfeld, CIPP, Chief Privacy Officer,
University of Pennsylvania, Philadelphia, Pa.
Zoe Strickland, CIPP/G, Chief Privacy Officer,
U.S. Postal Service, Washington, D.C.
Amy Yates, CIPP, Chief Privacy Officer,
Hewitt Associates, Lincolnshire, Ill
GENERAL COUNSEL
Jim Koenig, PricewaterhouseCoopers, Philadelphia, Pa.
See Cell Phone Records, page 20
3
March • 2006
IAPP National Summit 2006
continued from page 1
The largest conference in the IAPP’s
5-year history, the Summit’s size underscored how the privacy profession is
firmly established in today’s marketplace.
During his welcoming remarks, the
IAPP’s new president, Kirk M. Herath,
drew a parallel from the growth of the
IAPP’s marquee event to the privacy
profession itself. Motioning to a few
networking tables that bordered the
Regency Ballroom, Herath noted, “That
would have been a really large conference in 1996!”
Other veteran privacy pros, including
J. Trevor Hughes, the IAPP’s Executive
Director, told the attendees gathered to
hear keynote Jonathan Zittrain that he
“remembers when our profession was a
small cadre” of professionals. After witnessing the warm hugs and handshakes
among attendees greeting one another
at the Omni, Hughes observed that “this
professional community has really grown
to become a very close and tight knit
community.” As a profession, Hughes
stressed that privacy pros have obligations and duties.
“I’d like to demand of you today that
as privacy professionals, you have a
responsibility to join, engage and share
with your fellow professionals,” Hughes
told the attendees. “To respond to the
needs of your profession, you must join
the IAPP to support what we do so that
we can support what you do.”
Hughes reminded privacy pros that
one of the IAPP’s “great strengths” is
the knowledge-base they have as a
result of their diverse expertise. Hughes
urged privacy pros to participate and
engage in the IAPP.
Hughes applauded the IAPP’s
departing president, Chris Zoladz, Vice
President, Information Protection,
Marriott International, “for his steady,
savvy leadership as the IAPP has grown
from a small group to a force in the privacy community.” Hughes then welcomed Herath, Chief Privacy Officer,
Associate General Counsel of
Nationwide Insurance Companies, as a
“great leader in the IAPP” who will
serve the growing needs of the IAPP
and its membership.
Zittrain Delights Privacy Pros with
Engaging, Insightful Journey through
Privacy Past, Present and Future
Jonathan Zittrain, co-founder of
Harvard Law School’s Berkman Center
for Internet & Society then took the
Summit stage for a much anticipated
keynote, “Privacy: Past, Present and
Future.” Zittrain won over the audience
early with his entertaining style, joking
that it was “great to see 800 privacy professionals gathered in one place” but he
added that he hoped there were “a couple of privacy professionals squirreled
away in undisclosed locations.” On a
more serious note, he added, “It’s a testament to the work of the IAPP that so
much of this new and emerging profession is represented here today.”
Zittrain encouraged the attendees to
move from privacy past — during which
privacy pros were called upon after the
breach and then concentrated on “how
to do privacy right” by developing best
practices that are now “so firmly on our
landscape.” But in privacy present, he
advised privacy pros to focus on “privacy
as strategy.” Zittrain added, “I want us to
get out of the mode of thinking of privacy as defense — as something other
than prevention of intrusion.”
Then it was time for the virtual journey through privacy future. Zittrain led
attendees into a virtual exercise by asking them to imagine themselves walking
into a Paris café with a special device
that would melt away the anonymity of
the experience — layer by layer. After
pushing a few keys, a visitor could ask,
“First of all, are any of my friends here?
You can even start to say things like, ‘Are
there people from the IAPP here?
People from Microsoft who worked
there when I did?’ ”
(left) At least 550 attendees filled the Regency Ballroom during the
Thursday, March 9 plenary session to hear keynotes from Jonathan
Zittrain, Co-founder of the Berkman Center for Internet & Society, and
Brad Smith, Senior Vice President and General Counsel of Microsoft.
(above) Brad Smith, Senior Vice President and General Counsel of
Microsoft, gives his keynote address about the need for national
privacy legislation to a capacity crowd in the Omni's Regency
Ballroom on Thursday, March 9.
4
THE PRIVACY ADVISOR
Zittrain added as he strolled across
the podium, “And suddenly the act of
walking into a café is an action of discovery.”
According to Zittrain, Internet users
are already acquiring online reputations
as a result of spending time in virtual
communities that make judgments
about a person’s online behavior and
qualities. As a result, café guests could
suddenly become frosty toward a new
customer, “because maybe it turns out a
lot of people don’t like you so much.” Or
perhaps a user is the opposite — the
“Jimmy Stewart of the virtual world.”
But he added, “This is a world obviously that has privacy implications,
which are collectively generated.” With
the rapid technology innovations, Zittrain
said “our capacity to influence the environment has out-stripped our capacity to
measure what we are doing to it.”
Zittrain ended on an upbeat note,
challenging privacy pros to a call to
action. The choice is between choosing
our destiny rather than simply accepting
the circumstances "where we find ourselves.” Zittrain concluded by saying,
“We don’t want to end up in that
strange world — too early to tell and
too late to do anything about it.” Zittrain
called on privacy pros to join together
to exert “leadership as people who
have identified privacy as one of the
most important aspects of our professional careers.”
Microsoft’s Brad Smith Outlines
the Need for Federal Privacy
Legislation
Brad Smith, Senior Vice President
and General Counsel for Microsoft,
addressed the reasons why the company
is renewing the call for comprehensive
federal privacy legislation, a topic that,
“grows more complicated every year,”
according to Smith. He conceded that
consumer mistrust about the security of
their personal information is “not entirely
misplaced,” adding that this steady
stream of security breaches “does not
help win consumer confidence.”
Smith underscored the importance
in a global economy of harmonizing privacy at the national level. He described
the elements that Microsoft would like
to see in federal privacy legislation: federal preemption; transparency; consumer
choice; reasonable company measures
to ensure the security of personal information; and enforcement.
“We would be the first to say it won’t
be a panacea,” Smith said. “The truth is
that now and probably forever, privacy will
be protected effectively only if there are a
variety of steps taken in this area.”
Consumers, Smith noted, have the
responsibility to use the tools available
to protect their personal information.
“They too, need to take appropriate
steps that are provided to them to protect their personal information,” he said.
Smith stressed the need for a
dialogue among various stakeholders.
But he had a special message for privacy
pros. “If there is any one group of
people who can best think this issue
through, it is the group of people in this
room this morning. There will be different views. There will be different needs.
We certainly look forward to being part
of that conversation too.”
Smith’s keynote served as the
springboard into the lively panel discussion, “The Great Debate: National
Privacy Legislation.” Smith was joined by
Howard Beales from George
Washington University and Jerry
Berman, president of the Center for
Democracy and Technology. Christine A.
Varney, Partner, Hogan & Hartson and a
former FTC commissioner, served as
the panel’s moderator.
Popular Sessions
After the panel and refreshed by
fruit kabobs, the attendees set off for
their preferred sessions, which for the
first time, were designated as containing
“advanced” or “general” content.
See IAPP National Summit 2006, page 6
(above) Jonathan Zittrain, Co-founder of Harvard Law School's
Berkman Center for Internet & Society, opens the Thursday, March 9
plenary session with a provocative and entertaining keynote to an
audience of 600 people who gathered in the Omni's Regency
Ballroom. Zittrain proved to be a popular keynote with the attendees,
who gave him rave reviews.
(right) Joel Tietz, AXA Equitable's Privacy Officer, gives his presentation to at least 100 attendees of the "Governance For Compliance"
session held in the Diplomat Room on Thursday, March 9.
5
March • 2006
IAPP National Summit 2006
continued from page 5
Recent headlines about Google’s
attempts to resist a subpoena from federal authorities seeking access to the
company’s records understandably drew
a capacity-crowd to the session,
“Subpoenas: A Privacy Practitioner’s
Guide.” Other popular sessions were,
“Ethics,” “Rethinking Basic Privacy
Paradigms: Shifting from Control to
Harm-Based Analyses,” “Top 10 Privacy
and Security Developments for the
Insurance Industry,” “Marketing in the
Age of Cascading Trust: Affiliates, CoRegistration, Adware & More.”
After a busy but productive day, it
was time for some hobnobbing during
the Deloitte Reception in the Palladian
Ballroom, which underwent a transformation into an upscale, contemporary
lounge, with the help of gold-colored
draping and a tastefully lit cocktail bar.
Privacy pros had the opportunity to
unwind, talk with old friends and meet
some new ones.
(above) Summit attendees enjoy cupcakes
and icecream in the Exhibit Hall, held in
the Omni’s Ambassador Ballroom, during
a break to celebrate the IAPP’s 5th
Anniversary. Fasken Martineau sponsored
the Friday, March 10, break, which
immediately followed the conclusion of
certification testing and seven working
group sessions.
(left) J. Trevor Hughes, Executive Director
of the IAPP, joins a networking discussion
during a March 9 lunch sponsored by
Watchfire.
Certification Testing — The IAPP
Sets a New Record
The next morning, it was back to
business, as certification test-takers
converged on the Regency Ballroom to
participate in the IAPP’s single largest
testing class to date. Following a wellattended certification training session
held Wednesday, March 8 — which drew
just over 100 students — the certification exam brought 165 examinees to
the Summit classroom — a 10 percent
increase over the 2005 Summit, the previous benchmark.
As hopeful test-takers took the
CIPP and CIPP/G exams, seven working
groups gathered for their sessions — the
largest number convened to date. At
10:30 a.m., the testing and working
group sessions ended — just in time for
a morning break that featured ice cream
and cupcakes to mark the IAPP’s 5th
anniversary.
The morning sessions were then
under way, including “Training — Case
Studies for Success” and “U.S. and
Global Legislative Responses to Data
6
Security and ID Theft,” which drew
more than 100 attendees to each
program.
From the preconference sessions in
which attendees spent their afternoon
hours in one of four sessions, including
Privacy Professional Boot Camp, to the
sessions with more advanced content,
the Summit offered diverse programming for privacy pros — from beginners
to veterans — who eagerly took advantage of the comprehensive offerings.
Closing Keynotes Offer Viewpoints
on International, Domestic
Enforcement
The closing keynote sessions featured Christophe Pallez, the Secrétaire
général de la CNIL, the French data protection authority; Pamela Jones Harbour,
an FTC Commissioner; and Dr. David J.
Brailer, National Coordinator for Health
Information Technology, Department of
Health and Human Services.
Pallez asked his audience to be
patient with his “uncertain English,” and
then gave a brief introduction about the
CNIL’s powers and its structure.
Pallez acknowledged the interest
in international data transfers. “I know
that is a very important question for
you,” he told the attendees in the
Regency Ballroom. Pallez said the
CNIL is eager to see its approach to
international data transfers spread
across Europe. “The European Working
party has published very recently its
opinions, which are very similar to the
guidelines of the CNIL,” Pallez said,
adding that he was meeting the
following week with officials from the
Securities and Exchange Commission
about the issue. “They say to me that
they will at the staff level make an
opinion,” he said. “We are very confident that this opinion will show that our
guidelines meet most of the requirements of the Data Protection Act and
on the other hand, the requirements
of the Sarbanes-Oxley Act.”
THE PRIVACY ADVISOR
(above) Attendees take advantage of
networking opportunities during a
March 9 lunch sponsored by Watchfire.
People gathered in the Regency Ballroom
to network with privacy pros.
(right) Dr. Larry Ponemon, CIPP, and
President of the Ponemon Institute,
discusses Ethics with more than 100
attendees during an afternoon session
on Thursday, March 9.
Photography by Amy Sherwood
Pallez went on to say that while
data breaches are “a hot topic in the
U.S., I must say that it is not exactly the
same situation in Europe.” He added, “I
don’t know exactly why. Maybe it’s a
question of technology, but maybe it also
is a question of legal framework.”
However, France is not without its
problems, he said. “Identity theft — it’s
a real problem because our French passport is really easy to fake. You need
about 50 minutes to make a French
passport.”
Pallez was followed by Harbour, who
began her comments by reminding the
attendees that the “FTC has been very
active in privacy enforcement,” including
key 2005 cases involving BJ’s
Wholesale, DSW Inc., and ChoicePoint,
which was the recipient of the FTC’s
largest civil penalty to date.
“I hope that these settlements will
send a strong message to industry, and
that message is that companies will be
held responsible for providing the care
that consumers reasonably expect in the
handling of their personal information,”
Harbour said.
Harbour urged businesses to “give
consumer data the white-glove treatment” because “building trust, builds
business.”
Dr. Brailer Was in New Orleans
When Katrina Hit
After receiving the Privacy
Leadership Award, Brailer took the podium and declared, “I feel a bit of an
imposter in the privacy community.”
As he strives to complete the mission of creating a national e-medical
records system within 10 years, Brailer
said his goals are to tie doctors, hospitals and patients together electronically
to prevent paper shuffling; get information about patients more quickly to doctors; create more personalized health
records by giving patients control of their
health records; and “modernize the way
we protect against health threats.”
Brailer described some of the steps
necessary before the U.S. achieves
“generalized connectivity among doctors’ offices.” The U.S., he said, “lags
behind many other countries” in that
there is not a single set of information
standards. As a result, a health information technology standards panel is working on that mission, he said.
A group of health It professionals is
working to create standards to certify
vendors that have the right security and
privacy protections to “make sure that
information can’t be stolen or lost,”
Brailer said.
Brailer recalled that he was in New
Orleans when Katrina hit, which allowed
him to see first-hand the difficulties of
treating patients when their medical
history and an inventory of medications
they were taking were unavailable to
doctors. “People were being rescued
from their homes and being taken to
shelters, and the doctors and nurses
there did not know what medications
they were taking.”
Brailer was frank about the road
ahead. “We have a long way to go,” he
said. “I have more questions than I do
answers at this point.”
After Hughes adjourned the group
until the IAPP’s Privacy Academy 2006 in
Toronto, Canada, Oct. 18-20, privacy pros
packed up and left the Omni, which was
paying tribute to its 75th Anniversary
with a window display of famous guests
over the years.
It turns out others who value privacy
have chosen the Omni Shoreham.
“The Beatles called the Shoreham
home during their first public visit to
Washington in 1964,” read one window
display. “To ensure the group’s privacy
and security, an entire wing of one floor
was sealed off for their exclusive use,
and specially designed lapel pins were
issued to the elevator operators and
other hotel employees who worked in
that area during the Fab Four’s stay.”
Ann E. Donlan is the IAPP’s
Communications Director. She can be
reached at [email protected].
7
March • 2006
Cross Border Developments: Data Retention—
Implications For Business
Miriam H. Wugmeister and Karin Retzer
tial basis to support the
of the communication,
n February 21, the European
relevance of such data to
and individual member
Council formally adopted a concriminal investigations or
states can extend the
troversial Directive on the retenfor national security.
retention period up to
tion of communication data that raises
Another concern was
24 months. As a result,
privacy and data security concerns. The
that, due to the sheer
providers operating in
Directive may result in costly investmagnitude of the data
multiple jurisdictions
ments as companies seek to comply
that must be retained
could be subject to a
with the new requirements. Only the
under the new regime,
series of different rules,
Irish and Slovak delegations voted
the investment in equipand different retention
against it. The vote confirmed the
ment and technological
periods could apply to
European Parliament’s earlier decision
expertise for retaining
the very same centralized
on December 14, 2005. Once the
and accessing such data
database. In the end, the
Directive enters into force after the pubwill be significant, and
Parliament and the
lication in the Official Journal (which is
may result in increased
Council departed from
expected to happen soon), member
Miriam H. Wugmeister
communication costs for
the fully harmonized
states will have 18 months to ensure
consumers.
retention times the
national laws comply with it. With
However, the European legislature,
European Commission proposed in the
respect to Internet data, member states
i.e., the European Parliament and the
initial draft.
will have 36 months to transpose the
Council, rejected these concerns. It
The Directive was opposed strongly
Directive into national law.
agreed with Members States’ law
by civil liberties groups, data protection
The Directive requires all “providers
enforcement agencies that broad
officials and service providers alike.
of publicly available communication
retention obligations were necessary for
Currently, communications data generatservices” to store and retain communicriminal and anti-terrorism investigations
ed through communications services
cations data. Under the Directive,
across Europe.
such as landline, mobile and Internet
“providers” may be interpreted to
telephony, data text messaging, voiceencompass telecommunication operaBackground: The Changing Level
mail, call forwarding, instant messaging,
tors, Internet service providers, employLandscape
paging, electronic mail, and other multiers providing employees with email,
Data retention rules have evolved
media services must be erased or made
Internet cafes or hotels allowing guests
over the past decade. The original rules
anonymous at the time the communicato use communications devices, or even
issued in 1997 (Directive 1997/66/EC)
tion is completed, unless the information
universities providing students with
permitted, but did not require, member
is needed for subscriber billing, interconInternet access.
states to impose retention obligations
nection payments, or
The data covered by
on telecom operators for law enforcemarketing, or where
the Directive will include
ment purposes. In 2002, the data retennational law requires the
information on the caller,
tion rules were revised to cover the
retention of certain inforthe subscriber, the date,
entire electronic communications sector,
mation. The Directive
time, and location of the
but retention was still voluntary
marks a dramatic deparcall, including unsuccess(Directive 2002/58/EC). As a result of
ture from the EU’s forful call attempts. The
the discretion given to member states,
merly cautious attitude
data will be made availthere are wide variations among the EU
toward data retention,
able as needed to law
member states. Some have opted not
creating a regime far
enforcement agencies in
to impose retention obligations, while
more intrusive than anythe course of the investiothers require electronic communicathing known in the
gation and prosecution of
tions service providers to retain commuUnited States or Japan.
“serious criminal offensnications data for periods ranging from a
In Europe, communicaes.” The data must be
few months to four years. Under
tions data can now be
kept for a minimum of
Directive 2002/58/EC, national law had
Karin Retzer
held without a substansix months from the date
O
8
THE PRIVACY ADVISOR
to ensure that the data was only
retained for a limited period of time;
retention aimed to achieve specific, enumerated “public order” purposes, and
that the scheme was necessary, appropriate, and proportionate within a democratic society for achieving these purposes, consistent with the European
Convention on Human Rights.
Since 2002, EU law enforcement
agencies have lobbied for broader and
more harmonized retention schemes,
particularly because mobile phone
records were instrumental in tracking
down the perpetrators of the Madrid
bombings of 2004. In the aftermath of
those bombings, the European Council
issued the Declaration of Combating
Terrorism, which among other things,
recommended the introduction of traffic
data retention rules.
In April 2004, France, Ireland,
Sweden and the United Kingdom put
forward a joint proposal on data retention, which was rejected by the European
Parliament in 2005. In its place, the
European Commission launched its own
data retention initiative in close collaboration with the European Parliament. The
current Directive is the result of that
initiative, and member states have 18
months to comply with its provisions.
“The Directive also
requires retention of
data on unsuccessful
calls, defined as ‘a
communication where a
telephone call has been
successfully connected
but it is unanswered
or there has been a
network management
intervention.’ This
provision was controversial because providers
do not currently register
lost calls. Internetrelated data to be
retained is limited to
email and IP-telephone
data — which means
the data on Web pages
visited need not be
retained by providers.”
The Scope
The Directive covers “. . . providers
of publicly available electronic communications service or of public communications network . . .” (Article 3.1). As a
result, all telecommunication and
Internet service providers within
Members States’ jurisdictions must
store communications data. It remains
to be seen how the new retention
regime is applied by national regulators
and courts, and whether, for example,
hotels or apartment owners providing
guests with telephone and email,
Internet cafes, universities allowing students to use Internet and email, or even
private citizens with unprotected wireless LANs, are covered by the regime.
In addition, employers throughout
Europe have been facing the question of
whether they also would be considered
“providers of publicly available electronic
communications services” and thereby
become subject to data retention obligations when they provide Internet access
to their employees. In this respect, a
French appeals court ruled in 2005 that
employers can be required to retain and
hand over all relevant traffic data under
court order. The French court found that
the French data retention regime makes
no distinction between ISPs who offer
Internet access on a commercial basis,
and employers who give Internet access
to staff. It appears, therefore, that the
issue of mandatory retention schemes
for communications data may also be
expanded to encompass a broad range
of different organizations and private
citizens.
While the Directive is not applicable
to data revealing the content of commu-
nications, it does cover a wide variety of
data, including data required to identify
and trace the identity, source, destination, routing, date/time, location, the
communications device and equipment
involved, of every communication. The
categories of data that must be retained
will be revised on a regular basis.
The Directive also requires retention
of data on unsuccessful calls, defined as
“a communication where a telephone
call has been successfully connected
but is unanswered or there has been a
network management intervention.”
(Article 2(2)). This provision was controversial because providers do not currently register lost calls. Internet-related
data to be retained is limited to email
and IP-telephone data — which means
the data on Web pages visited need not
be retained by providers.
Circumstances for Access to
Retained Data
The Directive’s aim is to ensure that
the data is available for the purposes of
investigation, detection and prosecution
of serious crime, as defined by each
member state, in its national law.
Member states must ensure that
data retained in accordance with the
Directive is only provided upon request
from competent national authorities, in
specific cases, and in accordance with
national legislation.
Retention Period
The Directive obliges each member
state to ensure that the relevant data is
retained “. . . for a period of not less than
6 months and for a maximum of two
years from the date of communication”
(Article 7). There is, however, derogation
from the time period for particular circumstances warranting an extension of
the maximum retention period for a limited time. As a result, member states may
expand the time period, and may also
prescribe different periods for different
types of data. Providers operating in multiple jurisdictions could be subject to different retention periods. It is unclear as
to what extent providers could argue that
See Data Retention Implications, page 10
9
March • 2006
Data Retention Implications
continued from page 9
compliance with one set of rules, for
example, the rules applicable at the place
where the database is hosted, suffices.
Data Storage
Each member state will be required
to ensure that communications service
providers respect, as a minimum, certain prescribed data security principles
with respect to data retention. There is a
provision for “effective, proportionate
and dissuasive” penal sanctions for
companies that fail to store the data or
misuse the retained information, and
member states must designate an independent supervisory authority to ensure
compliance with the Directive. Because
these official instances “may be the
same authorities as those referred to in
Article 28 of Directive 95/46/EC”, the
data protection authorities may assume
supervisory authority for compliance
with this Directive as well.
Storage should allow for sharing
with law enforcement authorities without “undue delay.” However, the technical implications will need to be defined
in the implementation legislation. Data
must be destroyed after the period of
retention, except for those data that
have been accessed and preserved.
Reimbursement of Costs
While the original Commission proposal required member states to reimburse providers for the additional costs
of retention, the Directive adopted by
the Council contains no reimbursement
provisions, which leaves it to the discretion of the member states whether or
not to reimburse providers. The cost of
implementing a data retention capability
is estimated to cost millions of euros.
Miriam Wugmeister is a partner in the
New York Office of Morrison & Foerster
LLP. Karin Retzer is Of Counsel in the
Brussels, Belgium office of Morrison
& Foerster LLP. They may be reached
at [email protected] and
[email protected].
10
New Data Retention Rules in Europe:
Privacy Rights At Issue
Jacqueline Klosek
and location data. In imposn the aftermath of terrorist
ing new retention requireattacks in the U.S. and
ments, the Data Retention
Europe, legislators from
Directive will amend
around the world rapidly
Directive 2002/58/EC, also
undertook efforts to adopt
referred to as the Directive
and implement measures to
on Privacy and Electronic
prevent terrorism and capture
Communications.
terrorists. Given the nature of
The Data Retention
terrorism, many of these
Jacqueline Klosek
Directive will cover traffic and
measures included elements
location data transmitted through a
of enhanced powers of surveillance
wide range of communications serviand investigation. Today, continued
ces, including short message service,
concerns about the prevention of terwhich are text messages sent via cell
rorism and the apprehension of terrorphones, voicemail, call forwarding, call
ists are continuing to drive significant
transfer and messaging. Under the
legislative changes and motivate the
terms of the new Directive, covered
expansion of law enforcement powers.
Service Providers will be required to
Such changes are having a profound
retain traffic data and location from six
impact on individual liberties and privato 24 months, depending on the local
cy rights. At the same time, they are
law of the applicable member state.
altering the ways in which many comFurthermore, the Data Retention
panies, especially those that collect
Directive also will afford the governand process data, may do business.
ments of individual member states to
The Proposed Data Retention
exceed that range and impose even
Directive
longer retention requirements. There
While Europe has long been a
has been some speculation that at
leader in working to ensure that its citileast one member state was considerzens enjoy a high level of privacy proing the adoption of a rule that would
tection, Europe also has had to deal
require enterprises to retain such data
with the challenges of striking an
for as long as 15 years. Many industry
appropriate balance between protectgroups have expressed grave concerns
ing its citizens from terrorism and proabout the flexibility that will be affordtecting their human rights and individed to individual member states, arguual liberties. A notable development in
ing that it will result in compliance
this continuing challenge was the
challenges, as well as distortions in
recent approval of a new European
competition, in the marketplace.
directive concerning data retention,
Observers also have noted that
known as the Data Retention Directive. costs will vary from state to state. The
On December 14, 2005, the European
Data Retention Directive will provide
Parliament approved new measures
individual member states the freedom
that will require providers at publicly
to determine what — if any — financial
available electronic communication
assistance they will give to service
service and/or public communication
providers to offset the costs of setting
networks (collectively, service
up data retention systems.
providers) to comply with new requireMember States must transpose
ments regarding the retention of traffic
the Directive into national law by
I
THE PRIVACY ADVISOR
Article 29 Working Party Recommends Data Retention Safeguards
The safeguards identified in the October 2005 Opinion of the Article 29 Working Party can be summarized as follows:
• Data should only be retained to fight
terrorism and organized crime.
• The Directive should provide that the
data will only be given to specifically
designated law enforcement authorities (and a list of those authorities
should be made publicly available).
• Large-scale mining of the data
covered by the Directive should not
be permitted.
• Any further processing of the data
should be prohibited or limited stringently by appropriate safeguards.
Further, access to the data by other
governmental bodies should be
prohibited.
• Any retrieval of the data should be
recorded; but access to the records
would be limited and must be
destroyed within one year.
• Access to data should be authorized
only on a case-by-case basis by a
judicial authority, without prejudice to
countries that allow a specific possibility of access, subject to
independent oversight.
• The Directive should clearly define
which service providers are specifically covered by the retention
requirements.
• It should be clear that there is no
need to identify the customer unless
it is necessary for billing purposes or
some other reason to fulfill the
contract with the service provider.
• Providers should not be allowed to
process data for their own purposes
or any other reasons not specifically
required by the directive.
• The systems for storage of data for
public-order purposes should be
logically separated from systems
used for the providers’ business
August 2007. In the meantime,
member states have the authority to
postpone the implementation of local
data retention measures related to
Internet access, Internet telephone
services and email. However, the
states must apply general requirements of the Directive, including rules
controlling data access and
criminalization of illicit access.
Privacy Concerns Abound
Privacy advocates have been critical
of the new measures. Before the Data
Retention Directive was approved,
opponents’ objections were detailed in
an October 2005 Opinion of the Article
29 Working Party. The Opinion questioned whether the justification for the
data retention requirements were
based on clear evidence and challenged
the proposed retention periods. It also
identified 20 specific safeguards that
member states should establish to minimize the interference with individual
privacy rights.
purposes and protected by more
stringent security measures.
• The Directive should provide for
minimum standards for technical and
organizational security measures to
be taken by the providers, specifying
the general security measures established by the Directive on Privacy in
Electronic Communications.
• The Directive should specify that
third parties are not allowed to
access retained data.
• There should be a clear definition of
the data categories covered by the
retention requirements and a limitation on traffic data.
• The Directive must specify the list of
personal data to be retained.
• Specific guarantees should be
introduced to ensure a stringent,
effective distinction between
content and traffic data.
Efforts were made to address many
of the proposed safeguards in the final
version of the Data Retention Directive.
However, privacy issues still remain a
concern and were further highlighted on
December 19, 2005, when the office of
the European Data Protection
Supervisor (EDPS) issued an opinion
criticizing certain aspects of the
Directive and calling for enhanced privacy protection measures. Specifically, the
EDPS called for the following steps with
regard to the protection of data used by
law enforcement officials:
• The main data protection rules should
cover all police and judicial data (not
just data exchanged between member
states, but also data used within one
country).
• Data on different categories of individuals (such as, criminal suspects, convicted persons, victims, witnesses and
contacts) should be processed with
appropriate conditions and safeguards.
• The principles of necessity and propor-
• The different categories of traffic
data related to unsuccessful communication attempts should not
be included.
• There should be limitations on the
location data that can be stored.
• There should be effective controls on
the original and any further
compatible use of the data by
judicial authorities
• The Directive should include an
obligation to provide citizens with
information regarding all processing
operations undertaken under the
directive.
• The Directive’s provisions regarding
costs should be modified to clarify
that providers would be reimbursed
for investments in the adaptation of
communications systems and for
responding to law enforcement
demands for data.
tionality should reflect the case law of
the European Court on Human Rights.
• The quality of data received from a
third country would need to be
assessed carefully (in light of human
rights and data protection standards)
before used in any manner.
• Specific provisions on automated
individual decisions (similar to those in
the main Data Protection Directive)
should be introduced.
Implications for Service Providers
While privacy issues remain a key
focus, service providers will face the
practical challenges of implementing
measures to comply with the Directive.
Under its provisions, service providers
will be required to capture and maintain
a host of data, including: the source and
destination of a communication; the
date, time and duration of a communication; the type of communication; the
See Data Retention in Europe, page 12
11
March • 2006
Ask the Privacy Expert
Data Retention in Europe
continued from page 11
communication device; and the
location of mobile communication
equipment. It is notable that the
service provider must ensure that
data is retained in an accessible
database to allow businesses to
respond “without undue delay” to
authorities who request information.
Service providers should begin to
examine their current data-retention
systems to ensure that they will be
positioned to meet the legislation’s
new requirements.
Going Forward
In addition to imposing significant new requirements on service
providers, the proposed Data
Retention Directive is notable in
that it represents one of the more
recent developments in what is likely to be a very protracted battle to
balance the need to prevent terrorism while protecting individual liberties, including privacy rights. In the
coming months and years, we are
likely to witness continued developments in this ongoing struggle. In
the short run, service providers in
the European Economic Area
should consider examining their current systems for data retention to
ensure they will be ready to make
the necessary modifications
required by the new Directive.
Jacqueline Klosek, CIPP, is a
Senior Associate in the Business
Law Department and member of
the Intellectual Property Group,
Goodwin Procter LLP. She is the
author of Data Privacy in the
Information Age (Greenwood,
2000) and the forthcoming War on
Privacy (Greenwood, 2006). Klosek
is a member of The Privacy
Advisor’s Advisory Board. She can
be reached by email at
[email protected].
12
Readers are encouraged to submit their questions to
[email protected]. We will tap the expertise of
IAPP members to answer your questions.
Harry A. Valetk
Q
My company employs outside vendors to build and support systems
containing sensitive customer information. We want to be sure we’re
legally protected if any of our vendors lose information or otherwise
experience a data breach. What legal provisions should I try to negotiate in
our contract?
A
In today’s marketplace, virtually all businesses
collect some form of personal information from
their customers, prospects, competitors, and
employees. Many businesses rely on independent
contractors (based here and abroad) to upgrade vital
systems, support critical infrastructure, or manage
promotional campaigns.
To better protect your company in case one of your
vendors experiences a security breach, try to include
language in your contracts that:
Harry A. Valetk
• Limits access to personal information to only those vendor employees who
need to now the information to perform authorized services;
• Provides you with immediate notice of any security breach involving your
customers’ information;
• Requires vendor’s contractors with access to your customers’ personal
information to abide by your company’s confidentiality agreement;
• Covers your out-of-pocket costs of purchasing consumer credit monitoring
services; and
• Covers out-of-pocket costs of assembling and maintaining customer call center.
Few vendors will agree to pay all costs associated with a breach of
personal information, especially since much of injury involves your own
company’s brand. But most will agree to cover reasonable and predictable
costs associated with a data loss. By the same token, expect vendors to
adjust their price to cover these additional costs.
Harry A. Valetk is an attorney in New York City, and a former trial attorney with
the U.S. Department of Justice. He works closely with Web site operators to
establish best consumer practices online, and has written extensively on identity theft, privacy protection, and other Internet safety topics. He is an adjunct
assistant professor of law at the Bernand M. Baruch College, Zicklin School of
Business. Valetk is a member of The Privacy Advisor’s Advisory Board.
This response represents the personal opinion of our expert (and not that of his/her employer), and
cannot be considered to be legal advice. If you need legal advice on the issues raised by this question,
we recommend that you seek legal guidance from an attorney familiar with these laws.
THE PRIVACY ADVISOR
The FTC Launches a New Division Focused on
Privacy, ID Theft and Data Security
A Q & A about the FTC’s new Division of Privacy and Identity Protection, Featuring:
Joel Winston, an Associate Director with the FTC who heads the new division,
and Becky Burr, an IAPP Board member and a Partner with Wilmer Cutler & Pickering
in Washington, D.C. Burr is a former FTC employee.
Becky: Can you describe how the various
responsibilities of the Division of
Financial Practices have been divided up?
consolidate the oversight
of the privacy and data
security issues.
be continuing our law
enforcement program
in this area. We have
brought a number of cases
and we have a number of
other cases under investigation. We also will continue our educational and outreach programs.
Becky: You have had a very
Joel: The existing Division of Financial
busy year in 2005 with
Practices, which had primary responsibilsome pretty important and
ity for privacy matters within the FTC, is
groundbreaking cases.
essentially being split into two new diviWhat are you focused on
sions. One division will keep the title of
for 2006?
Division of Financial Practices, but with
Becky: Given that a majorisomewhat different duties. The other
ty of states have approved
Joel: As is often the case
division is the new one that I will be
notification requirements,
in this area, our agenda is
heading up, the Division of Privacy and
Becky Burr
many of us are assuming
driven in significant part by
Identity Protection. The new Privacy and
that there will be federal legislation.
Congress. We have spent the last two
Identity Protection Division will have
years implementing the Fair and Accurate
authority over privacy, data security
Joel: A primary driver of federal legislaCredit Transactions Act of 2003. Those
issues, Gramm-Leach-Bliley issues, as
tion is the fact that the states are jumpare the Fair Credit Reporting Act amendwell as credit reporting issues under the
ing into the void and passing laws which
ments which imposed very extensive
Fair Credit Reporting Act. In addition, the
are inconsistent with each other. These
rule-making obligations on the FTC and
Commission’s identity theft program,
laws obviously create some major
other federal agencies. We will continue
which as you know has been a very
headaches for businesses, so I think
active and successful program within the to be spending time on that. There are a
there will be a push for federal legislanumber of rule-makings and Commission
Commission, is being brought into this
tion. The main area of focus is when
studies that are still due under that
new division of Privacy and Identity
companies should notify consumers
statute. And then, secondly, a lot will
Protection. At the same time, the
when they’ve had a breach and what
depend on what Congress does, if anyDivision of Financial Practices will retain
form that notice should take. There also
thing, on the data security issue. I don’t
its oversight of the lending industry, as
is a lot of interest in imposing a general
think it will come as a surprise to anyone
well as other credit statutes, debt collecrequirement on businesses that retain
that a primary focus of this new division
tion, etc. There are other aspects of the
sensitive consumer information to have
will be on data security. As
Commission’s privacy
safeguards in place to make sure that
we read about the breachagenda that will remain
the information is protected from unaues of sensitive data seemelsewhere. For example,
thorized acquisition, similar to what is
ingly every week in the
our spyware program is
already on the books for financial institunewspapers, there is a lot
generally being run by our
tions. This concept would be broadened.
of concern on the public’s
Advertising Practices
part that their data is not
Division. The Do Not Call
Becky: The hard part is defining when
being kept in a secure way.
registry, which is an
notices should be sent and when it
And again, depending on
important part of our
doesn’t make sense. Consumers could
what Congress does, if it
privacy agenda, is run out
passes legislation, it is likely be alarmed needlessly or overwhelmed
of our Division of
with information in a way that makes
to involve significant
Marketing Practices.
Commission implementaGenerally speaking, this
See FTC Interview, page 14
tion. In any event, we will
new division is designed to
Joel Winston
13
March • 2006
FTC Interview
continued from page 13
them less sensitive to these kinds of
breach notifications. That’s a tough
standard to come up with.
Joel: It sure is. That is one of the biggest
issues that Congress has been struggling with. There is a lot of debate and
acrimony among different players in this
debate about how tight the standards
should be, how flexible they should be.
Some of the states and proposals for
federal legislation are quite specific that
in the case of a breach, there ought to
be notice and that companies should not
be given discretion to decide when the
notice might actually be beneficial to
consumers. But I think what we have
discovered is that there are a lot of
breaches — and they run the gamut
from those that are essentially harmless
to those that clearly pose a risk of identity theft or other sorts of harm to consumers. There needs to be some sort of
discretion given to businesses to make a
determination, hopefully with guidance
and with help from the federal agencies,
to allow these companies to decide in a
particular case whether it is a situation
that raises risks for consumers versus
those when there is really not much the
consumer can do. If you require notice in
the latter situation, you are going to
needlessly alarm consumers, or worse
yet, you are going to cause them to start
ignoring these notices. We think there
needs to be some element of flexibility.
Becky: We are beginning to see the
emergence of an industry standard on
the kind of credit protection offered to
individuals whose sensitive data may
have been disclosed. There are some
consumer protection advocates who
wonder whether in fact consumers are
being well-served by these programs, or
if perhaps other commercial interests
are coming into play.
Joel: Some of the federal legislation that
has been proposed — and some of the
legislation that has passed in the states
— would require the company that suf14
“There is a lot of debate
and acrimony among
different players in this
debate about how tight
the standards should
be, how flexible they
should be.”
— Joel Winston, FTC
fers the breach to provide affected consumers with free credit reports and free
credit monitoring for a period of time,
which at least on the surface, seems like
a good idea. The best way to figure out
whether your identity has been stolen is
to keep a close eye on your credit report.
Some of the companies that have had
breaches and offered credit monitoring
to consumers have told us that a remarkably small percentage of consumers
actually go ahead and order the credit
monitoring.
Becky: Like one in 10.
Joel: Yes, I’ve seen numbers like that
and so what does that mean? Does it
mean consumers aren’t even reading the
notices? Does it mean they are reading
them, but they are not really concerned?
Is there some reason why they are
skeptical about getting credit monitoring? We don’t really know, but it doesn’t
seem to be a panacea. Before legislation
mandating this sort of response is put
into place, we really need to get a better
handle on how useful it is.
Becky: With regard to the major
information security cases brought by
the FTC last year, the BJ’s Wholesale
case was quite interesting. I believe it
was the first time that the Commission
clearly invoked its fairness authority in
the context of data security and privacy.
Joel: Our previous cases in this area had
been on deception theories where companies had made claims, for example,
that they had procedures in place that
they didn’t have. But this was the first
unfairness case, and we have since followed it up with the DSW case, which is
similar. These are companies that didn’t
make specific claims necessarily about
how they safeguarded information, but
created substantial consumer injury by
not having reasonable procedures in
place. The result was that thieves were
able to get into the database, steal the
data and cause a lot of damage. While
these are unique cases in this area, we
think they follow well-established principles about unfairness law. There were a
lot of fixes these companies could have
put in place to prevent this from happening and they were virtually cost free. But
they didn’t do so. When you do that sort
of cost-benefit analysis, you determine
that what they did was not reasonable.
Becky: This is a question that actually
could have very significant implications
in the online world: What obligations
does a company have when it purchases
third-party information technology?
Who is responsible for ensuring that
third-party technology provides adequate
protection for data?
Joel: Well, again, it is a reasonableness
test. There are no hard- and fast-rules
here and certainly if a company, in good
faith, relies on representations made by
a vendor about the operation of software
or hardware that they are buying and
takes appropriate steps to verify that it
does what it says it does, that would
weigh very heavily in the determination
of whether they acted reasonably. Again,
it is not a strict liability standard. On the
other hand, if you look at the BJ’s case
and some of the others, to the extent
that these companies bought software
and used it, we felt that they were
clearly in a position to know about the
limitations of it and really ignored all
the warning signs.
This interview is available in its
entirety as a podcast on the IAPP’s
Web site, under Resources, at
www.privacyassociation.org.
THE PRIVACY ADVISOR
Viewpoint: Binding Corporate Rules are Good
for the Bottom Line
Eduardo Ustaran
hese days, many chief privacy officers at multinational organizations
“To put it in words that the board will understand:
are considering whether to dive
There are tangible commercial benefits in looking at
into the waters of Binding Corporate
Rules — a model that relies on applying
privacy as a strategic issue. Those organizations with
European data privacy standards within
European operations that can address this issue
an organization to obtain the blanket
approval of European regulators for the
by means of a BCR system will benefit.”
global flow of personal information.
General Electric likely has set many
Indeed, one of the reasons why data
On a more sophisticated level, BCR
records during its lifetime. But at the
protection authorities are quickly becomalso
serves
as
a
mechanism
to
analyze
end of 2005, it set another one by
ing so supportive of this idea is the fact
becoming the first company in the world the organization and maximize its
that BCR can help to change many negresources. Those who have looked at
to obtain the official approval of its data
ative perceptions people have about
BCR — as well as the documentation
protection Binding Corporate Rules
data privacy. When you look at this arguthat must be submitted to the regula(BCR). This approval was the first since
ment from the organization’s point of
tors — knows that providing a proper
April 2005 when the Article 29 Working
view, it becomes even more compelling.
description of the uses and flows of perParty, an advisory body to the European
When one examines the BCR
sonal data within the organization and
Commission comprised of member
model closely, the truth is that there is
how the BCR model relates to those
state data protection officials, adopted a
nothing mythical about it. The BCR syspaths, are essential. This is necessary to
pan-European cooperation procedure for
tem will prove in 2006 that it works for
prove to European regulators that the
the authorization of BCR. For GE, it
all types of international organizations in
company realistically will adopt a workseemed to be a clear-cut decision. Yet
many industry sectors. It is imperative
able BCR system. An efficient BCR sysmany other companies are asking this
that companies embrace the concept
tem will make a substantial contribution
critical question: Is the stamina and
that globalization affects all parts of the
to the efficient management of a key
investment required to get BCR off the
business, including the use of personal
asset: a company’s knowledge about its
ground justified by its benefits?
data as well as the basic rules that apply
organization
and
employees.
To
put
it
One can simply look at BCR as a
to that use. Chief privacy officers would
simply, BCR equals efficiency and effimatter of consistency of approach.
be wise to argue in favor of BCR on the
ciency equals profits.
Many privacy professionals belong to
grounds of its consistency, cost-efficienOne aspect of BCR that GE has
organizations that devote considerable
cy, legal certainty and user simplicity. To
championed is the fact that the system
management resources to get privacy
put it in words that the board will underturns data privacy obligaright. Those organizations
stand: There are tangible commercial
tions into user-friendly lanhave left behind a reactive
benefits in looking at privacy as a strateguage for data handlers
strategy in favor of proacgic issue. Those organizations with
and employees. For examtive privacy management.
European operations that can address
ple, a set of BCR that talks
They don't just fire-fight
this issue by means of a BCR system
about “data controllers,”
data privacy issues. They
will benefit. GE has shown that it can be
“data subjects” and “filing
look at privacy managedone. Many others are right behind.
systems” is poorly drafted
ment as a critical ingrediand inadequate. The point
ent of success. For those
of the BCR model is to
companies, implementing
translate it into language
Eduardo Ustaran is a data privacy speBCR is a consistent way
that
is
understood
easily
cialist at London law firm Field Fisher
to roll out and publicize
across ranks and jurisdicWaterhouse and can be reached at
established business practions. Data protection law
[email protected]. For further
tices, while earning the
was meant to be transparinformation on the BCR model, visit
regulators’ blessing during
ent and give people rights.
www.privacyandinformation.com.
the process.
Eduardo Ustaran
T
15
March • 2006
IAPP in the News
Privacy & Security Law Report Covers the IAPP’s
Genetic Privacy Audio Conference
NA staff correspondent Christopher
Brown covered the IAPP’s “Genetic
and Health Privacy: Policies, Practices
and Safeguards to Foster Consumer
Trust,” held Feb. 16.
Brown’s article appeared in the
Feb. 27 issue of the Privacy & Security
Law Report. In the article, Brown noted
that privacy experts said consumers’
fears about the possible misuse of
genetic information would have to be
addressed before scientific breakthroughs can be achieved through the
use of genetic research.
Despite the promise of genetic
research to help find new drugs and
therapies to treat diseases and to
develop tests to determine a patient’s
risk of acquiring a certain disease,
researchers are finding that patients
are reluctant to participate in clinical trials, said Timothy Leshan, chief of policy
B
” Surveys have demonstrated the high level of fear
among patients who worry that insurance companies
would use the genetic information to deny them coverage.”
and program analysis at the National
Institutes for Health. Surveys have
demonstrated the high level of fear
among patients who worry that
insurance companies would use the
genetic information to deny them
coverage, Leshan pointed out.
Leshan added that 41 states have
laws that to protect consumers from
discrimination in the insurance market
based on genetic information; 33 have
laws to protect against workplace
discrimination on the basis of genetic
information.
IAPP board member Harriet
Pearson, IBM’s Vice President of
Corporate Affairs, and Chief Privacy
Officer, outlined the company’s muchpublicized announcement in October
2005 that it would not use its workers’
genetic information to make employment decisions.
IBM, Pearson said, formed a task
force to look into genetic privacy to
ensure that the company was “doing
the right thing.” The task force review
resulted in the company’s policy on
genetic privacy. Pearson said the task
force’s work led the company to add
guidelines in genetic information to its
privacy policy, according to Brown’s
article.
The IAPP’s New President gets a lot of Ink
was focused on Herath’s
irk M. Herath, the
assessment of data
IAPP’s new board
breach notification legislapresident, and Associate
tion in the U.S.
General Counsel and
Herath said his
Chief Privacy Officer for
privacy philosophy
Nationwide Insurance
centers on the belief
Companies, has been
that “privacy should not
tapped as a privacy pro in
be viewed as a one-time
the know for recent privaproject but as programcy coverage.
matic management
Dubbed an “everywithin the enterprise.”
day compliance hero”
Herath was again the
by ITCi reporter Peter
Kirk M. Herath, IAPP, President
expert
privacy pro
Buxbaum, Herath was
of the Board of Directors
featured in a Feb. 8 proComputerworld reporter
file about his work as a privacy pro.
Jaikumar Vijayan turned to for a March
The article pointed out that Herath’s
2 story on breach notification laws.
accomplishments include his leaderIn that story, Herath stressed that
ship of the IAPP. Much of the article
companies “clearly have a responsibili-
K
16
ty to safeguard customer information.”
If a company loses that information,
“it’s our responsibility to inform consumers because that’s the only way
they can protect themselves.”
But Herath stressed that he favors
a disclosure requirement of a “clear
risk of danger or harm to the consumer.”
And Herath’s view was shared by
another fellow privacy pro and IAPP
board member, Kirk J. Nahra, Partner,
Wiley Rein & Fielding LLP, who agreed
that little is gained by “overnotification” of consumers.
Nahra, who serves as The Privacy
Advisor’s editor, noted that some laws
“would require notice in ridiculous
situations.”
THE PRIVACY ADVISOR
Privacy News
IAPP National
Summit 2006 Draws
Coverage from
Trade, Mainstream
Reporters
Washington Post columnist who
attended the recent IAPP National
Summit 2006 in Washington, D.C.,
spent some time between sessions
with the IAPP’s Executive Director, J.
Trevor Hughes. In an item in the
Sunday Washington Post’s Business
Section on March 19, reporter Don
Oldenburg plucked some information
about default boxes from his interview
with Hughes. The column noted that a
study, conducted by Eric Johnson at
Columbia University’s Business
School, has shown that subscription
rates increase by a 2-to-1 factor when
the box is already checked for a user.
The column also mentioned that the
IAPP “held a summit of 800 privacy
experts here a week ago.”
The Metro Herald, based in
Alexandria, Va., ran an article in
advance of the Summit noting that
the world’s largest association of
professionals in the privacy industry
was holding its National Summit
March 8-10 at the Omni Shoreham in
Washington, D.C. The article noted
that the Summit would offer attendees an in-depth focus on domestic
and international privacy issues,
including keynotes from Jonathan
Zittrain, Co-founder of the Berkman
Center for Internet & Society at
Harvard Law School; Brad Smith,
Senior Vice President, General
Counsel, for Microsoft; Dr. David J.
Brailer, National Coordinator for Health
Information Technology, U.S.
Department of Health and Human
Services; and Christophe Pallez,
Secrétaire général de la CNIL, France.
A
HP and Hitachi to Collaborate on
Security and Privacy Research
esearchers from HP Labs Bristol, UK, and Princeton, N.J., and the Hitachi
Systems Development Laboratory, will conduct joint work on key security
and privacy issues.
The research will focus on authenticating users and devices to improve
security inside networks and the use of digital signatures to guarantee the
authenticity of document content.
“This collaboration highlights HP Labs and Hitachi Labs’ common interest
in security research and our aim to bring about secure systems and infrastructure technologies for modern enterprise needs,” said Dick Lampman, Senior
Vice President of Research, HP, and director, HP Labs. “HP and Hitachi have
had technology alliances that have spanned 16 years, and this is an extension
of our partnership to further leverage our research and development.”
Network security and authentication has been stimulated by the constant
threat to IT infrastructures from, among many others, impersonation, computer viruses and worms. To combat these threats, HP and Hitachi researchers
are investigating how to ensure that computers used to access corporate networks remotely — from home or from a hotel room, for instance — are appropriately authorized. The researchers are interested in developing technologies
for a secure infrastructure that manages communications based on the
authentication of the integrity of both the PC and the user.
The team’s other focus is content security research to address the problem of how to guarantee the integrity of documents and data by using digital
signatures while allowing changes. For example, it may be necessary to delete
sensitive data such as names and company secrets from a document for reasons of privacy or confidentiality, yet show that the visible portion of the document is authentic. This process is applied regularly to documents affected by
the U.S. Freedom of Information Act and similar laws in other countries. This
type of technology also would help ensure the authenticity and integrity of
audit trails, an important issue for companies complying with legislation such
as the Sarbanes-Oxley Act.
“Hitachi and HP both recognize the increasing importance of security,”
said Dr. Akira Maeda, General Manager of Systems Development Laboratory.
“This collaboration is expected to contribute to a dramatic increase in
customer satisfaction by delivering entirely new security backbones.”
R
17
March • 2006
Privacy News
Ponemon Institute Names Most Trusted
Retail Banks
he Ponemon Institute has released
its 2006 Privacy Trust Study for
Retail Banking.
Sponsored by Vontu, the study
gauges how privacy issues affect retail
banking relationships and which banks
consumers identified as the most
trustworthy in protecting their
personal information.
T
“It is interesting to note that since
our last study in 2004, there has been
an 8 percent decline in the number of
THE FIVE MOST TRUSTED BANKS
FOR PRIVACY IN 2006
1. National City and U.S. Bank
(tied for first place)
2. Fifth Third Bank
3. Wachovia
4. PNC Bank
5. Washington Mutual
respondents who said their level of
confidence in their retail bank was
‘very high’ or ‘high,’ ” said Dr. Larry
Ponemon, chairman and founder of the
Ponemon Institute. “This can probably
be attributed to the number of wellpublicized security breaches in the
banking and financial services industry
and the sharp increase from 5 percent
to 12 percent in the number of respondents who reported receiving a notification of a privacy breach.”
Consumers who participated in
the study were asked to identify the
primary institution they currently use
for retail banking services from a list of
the 25 largest U.S. banks. If their primary bank was not listed, consumers
could add it to the survey form. The
participants were asked to answer
questions focused on their bank’s privacy and data protection practices.
18
“Preventing data breaches has
become a top priority for banks, partly
due to state notification laws, but
primarily because customer loyalty
depends upon it,” said Joseph
Ansanelli, chairman and CEO of Vontu.
“The new Ponemon Institute study
clearly demonstrates how much
banking customers care about data
loss prevention.”
According to the survey:
• 12 percent of respondents have
received notification of a privacy
breach within the past 12 months,
up from 5 percent in 2004.
• 68 percent of respondents are
confident that their bank would inform
them if a privacy breach resulted in
the leakage of their personal
information.
• 34 percent want to be notified by
telephone of a security breach and
30 percent prefer written notice. Less
popular are emails and Web postings,
15 percent and 16 percent,
respectively.
• 63 percent of respondents who
bank online are as confident that their
personal information is protected as
when they bank at their local branch
office. Since the 2003 study, this level
of confidence has declined 11 percent.
The survey also found that the
three most important factors in
boosting customer trust and confidence in their banks are not sharing
or selling personal information to
other organizations; not engaging in
aggressive marketing tactics; and
keeping consumers informed about
the bank’s practices and policies.
More information about the study is
available at [email protected].
Schwab
Announces Security
Guarantee
he Charles Schwab Corp. is offering its customers a guarantee
covering 100 percent of any account
losses that arise from unauthorized
account activity. The guarantee took
effect immediately in mid-February
when the company made the
announcement.
“It has always been our practice
to make clients whole in cases of
unauthorized account activity,” said
Charles R. Schwab, founder and
CEO. “Our new security guarantee
turns that historic practice into a
public promise. We have a broad
array of internal security systems
and measures in place that protect
the safety of client accounts at
Schwab. Given the rising public
concerns over identity theft and
cyber-fraud, we think adding a clear
and simple guarantee will contribute
to even greater peace of mind for
our clients.”
The company encouraged its
clients and consumers to review
privacy and security tips on
www.schwab.com to learn what
steps they can take to ensure safe
transactions online or through more
traditional channels.
The Charles Schwab Corp. is a
leading provider of financial services,
with more than 325 offices, 7.1 million client accounts and $1.25 trillion
in client assets. Through its operating
subsidiaries, the company provides a
full range of securities brokerage,
banking, money management and
financial advisory services to
individual investors and independent
investment advisors. Details about
the guarantee are available at
www.schwab.com/guarantee.
T
THE PRIVACY ADVISOR
Calendar of Events
APRIL
Privacy Classifieds
The Privacy Advisor is an excellent
resource for privacy professionals
researching career opportunities.
For more information on a specific
position, or to view all the listings,
visit the IAPP’s Web site,
www.privacyassociation.org.
19
Chicago
IAPP KnowledgeNet
Speaker: John Loft, Principal
Scientist Director, Research
Triangle Institute International
(RTI International),“Health Information
Security and Privacy Collaboration”
25
Keeping Information Safe
7:30 to 9:30 a.m. PST
The Regency Club
Westwood, CA
An information privacy seminar hosted
by Citadel Information Group, MRE
Enterprises and PossibleNOW. Eligible
for IAPP and California state MCLE
continuing education credits. Register
now at www.mre-ent.com
CORPORATE ANALYST
Sony Corporation of America
New York, NY
VICE PRESIDENT
ENTERPRISE PRIVACY
Countrywide Financial Corp.
Plano, Texas
27
SPECIALIST, PRIVACY
ANALYSIS AND SUPPORT
Countrywide Financial Corp.
Plano, Texas
PRIVACY OFFICER
CMP Media
Manhasset, NY
MAY
2-5
MANAGER OF PRIVACY
TECHNOLOGY
Carolinas HealthCare System
Charlotte, NC
DATA PRIVACY/
COMPLIANCE EXPERT
Sterling Commerce
Dublin, Ohio
SENIOR PRIVACY SPECIALIST
T-Mobile
Bellevue, WA
SR. MANAGER, BUSINESS
DEVELOPMENT FOR GLOBAL
NETWORK PRIVACY & POLICY
American Express
New York, NY
Los Angeles
IAPP KnowledgeNet
Speaker: Reece Hirsch, Partner,
Sonnenschein Nath & Rosenthal LLP,
”Data Security Law — The Emerging
Standard”
5-6
The 16th Annual Conferece
On Computers, Freedom
and Privacy
L’Enfant Plaza Hotel
Washington, D.C.
“Life, Liberty and Digital Rights,”
Registration: www.cfp2006.org.
Data Protection and Security:
A Transnational Discussion
Seminar presented by the Association
International Des Jeune Advocats (AIJA)
(the global association of young lawyers)
M Street Hotel
1143 New Hampshire Ave., NW
Washington, D.C.
+202.775.0800, More Information:
www.aija.org/uploads/events/events_
pdf/washington_08.pdf
8
Sydney, Australia
IAPP KnowledgeNet
Speakers: J. Trevor Hughes, CIPP,
Executive Director, International
Association of Privacy Professionals,
“The Emergence of the Global Privacy
Profession”; Peter Cullen, CIPP, Chief
Privacy Strategist, Microsoft Privacy
and Data Governance, “A Privacy Sector
Perspective”; Sagi Leizrov, CIPP, Ernst
& Young, Privacy and Data Governance
Issues “Top Ten Global Challenges”
10
Singapore
IAPP KnowledgeNet
Speakers: J. Trevor Hughes, CIPP,
Executive Director, International
Association of Privacy Professionals;
Peter Cullen, CIPP, Chief Privacy
Strategist, Microsoft; Sagi Leizrov,
CIPP, Ernst & Young
12
Tokyo, Japan
IAPP KnowledgeNet
Speakers: J. Trevor Hughes, CIPP,
Executive Director, International
Association of Privacy Professionals,
“The Emergence of the Global Privacy
Profession”; Peter Cullen, CIPP, Chief
Privacy Strategist, Microsoft Privacy
and Data Governance, “A Privacy
Sector Perspective”; Sagi Leizrov,
CIPP, Ernst & Young, Privacy and Data
Governance Issues, “Top Ten Global
Challenges”
OCTOBER
18 – 20 IAPP Privacy
Academy 2006
The Westin Harbour Castle
Toronto, Canada
More information is available at
www.privacyassociation.org.
To list your privacy event in the
The Privacy Advisor,
email Ann E. Donlan at
[email protected].
19
March • 2006
Cell Phone Records
continued from page 3
Congress Gets in the Game
Pretexting in order to acquire phone
records soon may become a specific
criminal offense. At the time of writing,
several bills that would criminalize pretexting are before the House and
Senate Judiciary Committees, as well as
the House Energy and Commerce
Committee. These bills generally enjoy
bipartisan support.
The FCC and FTC were held to
account for their respective roles in protecting call records during an early
February 2006 hearing before the House
Energy and Commerce Committee.
Chairman Kevin Martin of the FCC
described his agency's investigation of
data brokers and telecom carriers. In
response to formal Letters of Inquiry
from the FCC, carriers have made
detailed disclosures concerning their
CPNI safeguards. In addition, the
Chairman reported threatened $100,000
fines against both Alltel and AT&T for
failure to produce adequate CPNI compliance certifications. Jon Leibowitz,
Commissioner of the FTC, reported that
his agency, in coordination with the
FCC, is pursuing vigorously those who
sell call records obtained through pretexting. In addition, the FTC is using its
statutory authority to demand reasonable security practices of companies
subject to FTC jurisdiction that store
sensitive consumer information.
this time, lawyers may feel the heat.
EPIC has written to state professional
responsibility boards urging them to prohibit attorneys from purchasing illegally
obtained call records.
Amy E. Worlton is an associate with
Wiley Rein & Fielding LLP in Washington,
DC. She specializes in privacy, security,
telecommunications, international trade,
Internet and e-commerce issues. Worlton
can be reached at +202.719.7458 or
[email protected].
States Also in Play
State attorneys general in Florida,
Illinois, Missouri, Arizona and elsewhere
have launched investigations of suspected pretexters, as well as inquiries into
the practices of telecom carriers.
Reportedly, the state and federal
full-court press against sellers of call
records already has driven many of
these Web sites to close up shop. But
EPIC is keeping up the pressure, and
© 2006 Wiley Rein & Fielding LLP.
Reprinted with permission, Privacy
in Focus, February 2006. This is a
publication of Wiley Rein & Fielding
LLP providing general news about
recent legal developments and should
not be construed as providing legal
advice or legal opinions. You should
consult an attorney for any specific
legal questions.
PRESORTED
STANDARD
U.S. POSTAGE
PAID
E. HAMPSTEAD, N.H.
PERMIT NO. 65
20