Enabling Data-Centric Security Merchants Can No Longer Ignore
Transcription
Enabling Data-Centric Security Merchants Can No Longer Ignore
March 2007 • Volume 7 • Number 3 Editor: Kirk J. Nahra Merchants Can No Longer Ignore the PCI Data Security Standard Reece Hirsch redit card data is a primary target for identity thieves because it is easily exploited in fraudulent transactions and it is often all-too-accessible. In the absence of a U.S. law that imposes a general obligation on businesses to safeguard credit card information and other sensitive customer data, the credit card associations took matters into their own hands by adopting the Payment Card Industry (PCI) Data Security Standard (DSS) in 2005. In recent months, support for the PCI Data Security Standard appears to be gaining momentum with the issuance of an updated version of the standard. C an updated version of On September 7, 2006, PCI DSS. the five major credit card Visa implemented companies announced the PCI’s predecessor standard, formation of a new organizathe Cardholder Information tion to improve and impleSecurity Program (CISP), in ment the PCI standard, mark2001. MasterCard and Visa ing the first time that the five introduced the PCI Data major brands (American Security Standard (PCI DSS) Express, Discover Financial in 2004, and it took effect Services, JCB, MasterCard By Reece Hirsch June 30, 2005. Worldwide and Visa The PCI Data Security International) have agreed to Standard has prompted relatively little a single, shared framework. The new action by merchants. Visa recently group, known as the Payment Card International Security Standards Council, took its first action by issuing PCI 1.1., See, PCI Data Security Standard, page 3 Enabling Data-Centric Security Luther Martin than traditional encryption technologies. Forget Conventional So how exactly did Wisdom. Modern encryption earn its reputation Encryption Technology for being too difficult and too is Ideal for Privacy costly for widespread use? Applications. Here’s Why. Let’s take a quick look at encryption’s evolution, review our organization needs the difficult early years and to comply with privacy examine how today’s IBE regulations. Your board Luther Martin approach solves the problems of directors knows the busifrom yesteryear. ness needs to protect sensitive informaIn a 1995 Carnegie-Mellon tion as it moves among business partUniversity study (popularized in the ners, mobile users and your enterprise. paper, “Why Johnny Can’t Encrypt”), Yet security technologies such as sending and receiving encrypted email encryption are far too complex and far proved to be too hard for 75 percent of too difficult to deploy on a broad scale. the study’s participants. Fast forward 10 Actually, that is no longer the case. Leveraging identity-based encryption (IBE) is far easier and more scalable See, Data-Centric Security, page 5 Y This Month J. Trevor Hughes on the Inaugural European Delegate Tour..............Page 2 India and Outsourcing ........................Page 7 Ask the Privacy Expert........................ Page 10 Privacy Classifieds ............................ Page 11 Regulator Chat .................................. Page 12 IAPP in the News................................Page 14 Update: Statutory Review of PIPEDA.Page 15 Certification Graduates...................... Page 17 Privacy News .................................... Page 18 Calendar of Events ........................... Page 20 March • 2007 THE PRIVACY ADVISOR Editor Kirk J. Nahra, CIPP Wiley Rein LLP [email protected] +202.719.7335 Managing Editor Ann E. Donlan, CIPP [email protected] +207.351.1500 X109 Publications Manager Ali Forman [email protected] +207.351.1500 The Privacy Advisor (ISSN: 1532-1509) is published monthly by the International Association of Privacy Professionals and distributed only to IAPP members. ADVISORY BOARD Elise Berkower, CIPP, Executive Vice President of Privacy Strategy, Chapell & Associates Keith P. Enright, Director, Customer Information Management, Limited Brands, Inc. Philip L. Gordon, Shareholder, Littler Mendelson, P.C. Brian Hengesbaugh, Partner, Privacy/Information Technology/E-Commerce, Baker & McKenzie LLP Todd A. Hood, CIPP, Director, Regional Privacy, The Americas, Pitney Bowes Inc. Ben Isaacson, CIPP, Privacy & Compliance Leader, Experian & CheetahMail Jacqueline Klosek, CIPP, Senior Associate in the Business Law Department and member of Intellectual Property Group, Goodwin Procter LLP Lydia E. Payne-Johnson, CIPP, LPJohnson Consulting, LLC Billy J. Spears, CIPP/G, Senior Manager of Privacy and Information Protection, Dell, Inc. Harry A. Valetk, CIPP, Director, Privacy Online, Entertainment Software Rating Board To Join the IAPP, call: +800.266.6501 Advertising and Sales, call: +800.266.6501 Postmaster Send address changes to: IAPP 266 York Street York, ME 03909 Subscription Price The The Privacy Advisor is a benefit of membership to the IAPP. Nonmember subscriptions are available at $199 per year. Requests to Reprint Ann E. Donlan [email protected] +207.351.1500 X109 Notes from the Executive Director A s part of the IAPP’s international commitment, we are proud to announce the launch of our inaugural European delegate tour. While details are still in the works, the delegate tour is a unique opportunity for IAPP members to participate in a series of special events in London, Paris and Berlin. Scheduled for June, the tour is expected to give privacy pros an opportunity to compare notes with our European colleagues in each city during KnowledgeNet meetings, workshops with data protection authorities and networking opportunities. The first European delegate tour would not be possible without the generous support of Microsoft and Ernst & Young. The IAPP is excited about this tour as we continue our efforts to broaden our mission to promote the privacy profession globally. We eagerly look forward to learning from and collaborating with international privacy pros. And now for the good news! IAPP members will have the opportunity to attend these exciting events — at no additional cost. All we ask is that members cover the cost of their travel expenses and hotel stay. The IAPP will provide all the programming, including networking meetings and workshops, in each city. This spectacular networking opportunity has to be one of the best values — and we are thrilled to offer our members the chance to take part in what is sure to be a memorable tour. Members who are interested in participating in this unique privacy programming are encouraged to contact Kimberly MacNeill, the IAPP’s Member Networking Manager, at [email protected]. Please note there may be some space limitations. Let me take a moment to also update you on another IAPP global privacy effort. Peter Kosmala, the IAPP’s Assistant Director, recently returned from a week in Singapore, where he spoke at an online privacy conference co-sponsored by the IAPP and LexisNexis, and met with privacy leaders across the private and public sectors in Singapore. These included KK Lim, CIPP, Chief Privacy Officer-Asia Pacific, IMS Health; Lawrence Tan, CIPP/G, Senior Consultant, IDA-Infocomm Development Authority of Singapore; Jeff Bullwinkel, Director of Corporate Affairs-Asia Pacific, Microsoft, Singapore; and Wee Choo Hua, Corporate Attorney, Microsoft, Singapore, among many others. With more than 6,000 multinational corporations based in the country, 106,000 working IT professionals, and a growing community of privacy professionals, Singapore is a hotbed for innovation and ripe this year for legislative action in the data protection arena. Peter’s trip is a follow-up to the IAPP’s Asia Pacific Tour last year, when we took our signature privacy networking program on the road, holding KnowledgeNet meetings in Sydney, Singapore and Tokyo. While it is unclear at this juncture what specific developments are likely from the IAPP’s collaboration with privacy leaders in Singapore, the IAPP definitely will continue our activity and coordination in the Asia Pacific Region in the months ahead — so stay tuned! On the domestic front, look next month for coverage of the IAPP Privacy Summit 07 in Washington, D.C., an enormously successful conference lauded by privacy professionals from near and far. Copyright 2007 by the International Association of Privacy Professionals. All rights reserved. Facsimile reproduction, including photocopy or xerographic reproduction, is strictly prohibited under copyright laws. 2 J. Trevor Hughes, CIPP Executive Director, IAPP THE PRIVACY ADVISOR PCI Data Security Standard continued from page 1 estimated that only 22 percent of the largest merchants (those that handle more than 6 million credit card transactions per year) are PCI-compliant today. But it expected that number to climb dramatically by the end of 2006. Visa also has estimated that 72 percent of the largest merchants have conducted an initial PCI audit, identified their deficiencies and have a remediation plan in place to achieve full compliance. Merchants ignoring the growing adoption of the PCI DSS do so at their peril because the penalties for noncompliance are severe. Noncompliant merchants and payment processors can face as much as $500,000 in fines per incident if cardholder data is compromised. Visa has reported that it imposed $4.6 million in fines against banks in 2006, up from $3.4 million in 2005. Even more devastating than fines, credit card companies also may revoke the right of a merchant to process credit card transactions, a virtual death sentence for many businesses. Carrots and Sticks On December 12, 2006, Visa announced a new program, known as the “Visa PCI Compliance Acceleration “Merchants ignoring the growing adoption of the PCI DSS do so at their peril because the penalties for noncompliance are severe. Noncompliant merchants and payment processors can face as much as $500,000 in fines per incident if cardholder data is compromised.” Program,” which seeks to create financial incentives to encourage PCI compliance. Under the program, Visa has committed $20 million to offer financial incentives to banks that process credit card transactions if they can demonstrate that the merchants they deal with are PCI-compliant. A Visa spokesperson has stated that the new program is intended to supplement the “stick” of noncompliance penalties with a “carrot” in the form of financial incentives. It appears that credit card associations may no longer be the only parties seeking to compel compliance by merchants with PCI DSS standards. In January 2007, the director of the Massachusetts Office of Consumer Affairs and Business Regulation announced plans to call on merchants to begin disclosing the extent to which they comply with the PCI DSS. In February 2007, a class action claim filed in Massachusetts federal district court charged that TJX, Inc. failed to adhere to PCI standards. PCI’s Three-Tiered Approach The PCI DSS applies to three tiers of entities: the merchant, the acquiring bank and the credit card associations that are members of the PCI Security Standards Council. Merchants are the first tier because they are on the “front lines” of credit card transactions. A merchant, either through a physical store or a Web site, accepts credit card payments from the consumer. The PCI Data Security Standard assumes that merchants are in the best position to safeguard credit card information because they are the point of contact with the consumer. As a result, merchants bear the brunt of the standard’s compliance obligations. The second level is the “acquiring bank” or “acquirer.” A merchant that processes credit card transactions must have a relationship with an acquiring bank that processes the transaction. The merchant contacts the acquirer to confirm that the consumer has sufficient 266 York Street York, ME 03909 Phone: +800.266.6501 or +207.351.1500 Fax: +207.351.1501 Email: [email protected] The Privacy Advisor is the official monthly newsletter of the International Association of Privacy Professionals. All active association members automatically receive a subscription to The Privacy Advisor as a membership benefit. For details about joining IAPP, please use the above contact information. BOARD OF DIRECTORS President Kirk M. Herath, CIPP/G, Chief Privacy Officer, Associate General Counsel Nationwide Insurance Companies, Columbus, Ohio Vice President Sandra R. Hughes, CIPP, Global Privacy Executive, Procter & Gamble, Cincinnati, Ohio Treasurer/Past President Chris Zoladz, CIPP, Vice President, Information Protection, Marriott International, Bethesda, Md. Assistant Treasurer David Hoffman, CIPP, Group Counsel and Director of Privacy & Security, Intel Corp., Germany Secretary Jonathan D. Avila, CIPP, Vice President - Counsel, Chief Privacy Officer, The Walt Disney Company, Burbank, Calif. Executive Director J. Trevor Hughes, CIPP, York, Maine John Berard, CIPP, Managing Director, Zeno Group, San Francisco, Calif. Malcolm Crompton, Managing Director, Information Integrity Solutions Pty Ltd., Chippendale, Australia Peter Cullen, CIPP, Chief Privacy Strategist, Microsoft Corp., Redmond, Wash. Peter Fleischer, Privacy Counsel – Europe, Google, Paris, France Dean Forbes, CIPP, Global Privacy Officer, Schering-Plough Corp., Kenilworth, N.J. D. Reed Freeman, Jr., CIPP, Partner, Kelley Drye Collier Shannon, Washington, D.C. Kimberly Gray, CIPP, Chief Privacy Officer, Highmark, Inc., Pittsburgh, Pa. Jean-Paul Hepp, CIPP, Corporate Privacy Officer, Pfizer Inc., New York, N.Y. Barbara Lawler, CIPP, Chief Privacy Officer, Intuit, Mountain View, Calif. Kirk Nahra, CIPP, Partner, Wiley Rein LLP, Washington, D.C. Nuala O’Connor Kelly, CIPP/G, Chief Privacy Leader and Senior Counsel, General Electric Company, Washington, D.C. Harriet Pearson, CIPP, Vice President Corporate Affairs, Chief Privacy Officer, IBM Corporation, Armonk, N.Y. Lauren Steinfeld, CIPP, Chief Privacy Officer, University of Pennsylvania, Philadelphia, Pa. Zoe Strickland, CIPP/G, Vice President, Chief Privacy Officer, Wal-Mart Amy Yates, CIPP, Chief Privacy Officer, Hewitt Associates, Lincolnshire, Ill See, PCI Data Security Standard, page 4 3 March • 2007 PCI Data Security Standard continued from page 3 funds in the consumer’s account and authorizes payment. The credit card associations occupy the third tier. The associations develop PCI standards and impose them upon the acquiring banks, which are responsible for implementation of, and compliance with, those standards. The associations do not have a direct relationship to the merchants, and rely upon the acquiring banks to enforce the PCI requirements with respect to merchants. Encryption and Compensating Controls One PCI standard creating headaches for merchants is the requirement of database encryption. A covered entity must render cardholder data unreadable anywhere it is stored by using strong cryptography, such as Triple Data Encryption Standard 128-bit encryption, or other specified methods. It appears that even many large processors of credit card transactions have not yet achieved full PCI compliance due to the time and cost associated with implementing database encryption projects. The PCI Security Standards Council’s September 2006 update of the standards made this requirement more flexible, providing that if for some reason a company is unable to encrypt cardholder data, “compensating controls” may be employed. The update provides that compensating controls may be considered for most PCI DSS requirements when an entity cannot meet a technical specification of a requirement, but has sufficiently mitigated the associated risk through other controls. The PCI Security Standards Council has issued a PCI DSS Glossary, which specifies that compensating controls must: (1) Meet the intent and rigor of the original stated PCI DSS requirement; (2) Repel a compromise attempt with similar force; (3) Be “above and beyond” other PCI DSS requirements; and (4) Be commensurate with the additional risk 4 The Digital Dozen The PCI Data Security Standard contains basic security requirements, also known as the “digital dozen.” The Standard requires covered entities to: • Install and maintain a firewall configuration to protect data; • Not use vendor-supplied defaults for system passwords and other security parameters; • Protect stored cardholder data; • Encrypt transmission of cardholder data and sensitive information across public networks; • Use and regularly update anti-virus software; • Develop and maintain secure systems and applications; • Restrict access to data by business need-to-know; • Track and monitor all access to network resources and cardholder data; • Regularly test security systems and processes; and • Maintain a policy that addresses information security. Unlike many statutes and regulations that address data security, the PCI DSS includes specific metrics and specifications for each of the requirements. Nevertheless, PCI’s digital dozen generally reflect basic security principles consistent with reasonable best practices. imposed by not adhering to the PCI DSS requirement. Clearly, this new flexibility is by no means an easy out for merchants seeking to bypass PCI’s encryption standard or other standards posing implementation difficulties. Merchants that fail to encrypt cardholder data must be prepared to perform a PCI security audit to demonstrate the presence of “compensating controls” and “mitigating circumstances.” It also is becoming apparent that different auditors have different interpretations of what “compensating controls” and “mitigating circumstances” are adequate. Differing interpretations of these critical terms could lead to significant variation in implementation of PCI DSS and “forum shopping” for security auditors who are perceived to have adopted a more lenient (and less costly) reading of the standards. Penalties for Noncompliance Although the credit card associations have not been very active thus far in enforcing the PCI Data Standard, the potential consequences of noncompliance are severe. Acquiring banks are responsible for monitoring PCI compliance and reporting noncompliant merchants. An acquiring bank may report a merchant violating PCI to the Terminated Merchant File or MATCH list, which is available to other acquirers. A merchant placed on the MATCH list will have great difficulty in processing credit card transactions, and there is no clear process for a merchant to appeal the determination. The most substantial penalties may be applied if the credit card association determines that a security breach occurred and, at the time of the breach, the merchant was not PCI-compliant. In such a case, the merchant will be responsible for a full-scale investigation of the breach. After the investigation, the merchant must obtain a PCI compliance certification in order to continue processing credit card transactions. The merchant also may be responsible for any and all charges posted to credit card numbers obtained through the THE PRIVACY ADVISOR “ Merchants should be proactive and adopt a diligent approach to PCI compliance, as part of an enterprisewide approach to privacy and security." breach. As if those consequences were not dire enough, the acquiring bank may fine the merchant $500,000 per incident. Because so many merchants are currently not in full compliance with PCI, it is important to understand to what extent partial compliance may insulate a merchant from liability. If a merchant is subject to a security breach and is not fully PCI-compliant, do the more substantial penalties described above automatically apply? What if the breach occurs with respect to an aspect of the merchant’s systems that is currently PCI compliant? These murky issues will hopefully be clarified as the standards are enforced by the associations through the acquiring banks. Enforcement is another muddled area of the PCI DDS. The creation of the PCI Security Standards Council creates a broader platform for PCI because all five major credit card brands are now responsible for maintaining the standard, not just MasterCard and Visa. However, each member credit card that is a member of the PCI Security Standards Council remains individually responsible for enforcing the PCI standard through acquiring banks. Unless the Council issues PCI enforcement guidance, it is unlikely that PCI enforcement will be uniform or predictable. Compliance Steps The PCI DSS program divides merchants into four levels, based on the volume of credit card transactions they process annually. Most merchants will fall into merchant levels 2 (between 1 and 6 million transactions), 3 (fewer than 1 million transactions) or 4 (fewer than 20,000 online transactions). Merchants in levels 2, 3 and 4 are permitted to “self-certify” their compliance with the PCI Data Standard, rather than obtaining a PCI audit from an independent vendor. It is relatively easy for a merchant to selfcertify and take a lax approach to PCI compliance — but that places the merchant in a very dangerous position if it experiences a security breach involving credit card transactions. Therefore, merchants should be proactive and adopt a diligent approach to PCI compliance, as part of an enterprise-wide approach to privacy and security. Merchants should not shy away from the more complex aspects of PCI compliance, such as database encryption, establishing a security-oriented hiring policy for staff and contractors, and assigning each person a unique ID for accessing data. In addition, covered entities should amend their contracts with vendors that access cardholder data to include certain PCI-specific provision, such as the right to audit to validate compliance with the PCI standard. While the PCI Data Standard will undoubtedly continue to evolve, any changes are likely to only facilitate wider adoption of the standard. In short, the PCI Data Standard is rapidly becoming an inescapable fact of life for all merchants that process credit card transactions. Data-Centric Security continued from page 1 Reece Hirsch is a partner in the San Francisco office of Sonnenschein Nath & Rosenthal LLP specializing in privacy and data security issues. He can be reached at +415.882.5040 or [email protected]. Security expert Dan Geer, currently the chief scientist of Verdasys, once conjectured that the cost of using encryption is roughly the same, no matter what encryption technology you embrace. If an organization leverages symmetric encryption (technology that uses the same key to both encrypt and A version of this article appeared previously in BNA’s Privacy & Security Law Report. years and there seems to have been little progress in this area, as the title of the 2006 follow-up paper, “Why Johnny Still Can’t Encrypt” indicates. If encryption isn’t practical, there’s no point in doing it. The high cost of using encryption is often connected to the cost of public key infrastructure (PKI). According to the General Accounting Office, U.S. federal agencies typically spend more than $220 per digital certificate during PKI projects. In a few cases, the cost exceeded $1,000 per certificate, even exceeding $46,000 in one case. It’s hard enough to do a convincing ROI calculation for many security technologies – imagine how hard it would be to justify costs like those. “ IBE leverages a user’s identity for his or her key instead of using a random collection of bits. This approach eliminates many of the difficulties with traditional encryption and therefore makes encryption a more cost-effective solution for meeting today’s data privacy regulations.” See, Data-Centric Security, page 6 5 March • 2007 Data-Centric Security continued from page 5 decrypt), Geer noted that the cost of granting the keys is high. He also noted that the cost of using asymmetric encryption (technology where one key is used to encrypt and another key to decrypt) is also high. In this case, checking keys for validity before they are used triggers most of the cost. Geer’s conjecture indicates that organizations shouldn’t expect to escape the high cost of encryption, regardless of our approach. Turning Point 1n 2001, Professors Dan Boneh of Stanford University and Matt Franklin of the University of California, Davis, invented a new type of cryptography that violates Geer’s principle. Specifically, they created the first practical and secure identity-based or IBE algorithm. IBE leverages a user’s identity for his or her key instead of using a random collection of bits. This approach eliminates many of the difficulties with traditional encryption and therefore makes encryption a more cost-effective solution for meeting today’s data privacy regulations. The benefits don’t end there. IBE is simpler that PKI, and therefore has a lower total cost of ownership (TCO). In fact, IBE is more than six-times less expensive than PKI alternatives, according to Ferris Research. Protecting the data instead of the network is now feasible, and the goal of eliminating the need to maintain a strong, well-defined network security perimeter is a realistic one. Your Identity, Your Privacy IBE can use almost anything as a person’s identity, an email, IP or hardware address — as long as it’s unique. Today, more than 5 million users worldwide leverage IBE to encrypt email messages, and for most, their email addresses are their identities. A big benefit to organizations is that it is also quite easy to include policy 6 Supporting Structured & Unstructured Data “ Clearly, IBE has solved many of the encryption challenges that today‘s enterprises face. By embedding policy directly in keys, IBE makes it easy to enforce policy. And by leveraging existing IAM infrastructure to define identities, IBE easily integrates into existing infrastructures.” information in an IBE key. Instead of encrypting using the identity — “[email protected],” it’s just as easy to encrypt using the identity “[email protected]&classification=PCI.” The way to calculate an IBE encryption key is publicly known, and all IBE-enabled applications can do it. Data from existing Identity and Access Management (IAM) systems can define identities, helping increase the return on that investment as IBE is used to solve the problem of managing data privacy. For decryption to take place using IBE, a user has to be able to authenticate to a key server. The user who requests a key needs to prove he or she are authorized to receive it. If “[email protected]&classification=PCI” is used as an IBE encryption key, for example, a user might have to prove both that he or she owns the email account ([email protected]), and that he or she is entitled access to the PCI information before the key server grants the decryption key. This ability to implement policy within the keys separates IBE from other encryption technologies. Further, IBE can easily implement the type of complex policies that data privacy regulations require. The ease of using IBE to encrypt data is not affected by the level of structure in it. Traditionally, it has been manageable to encrypt a database, a case where the data is highly structured. Encrypting data with less structure, like email, has been more difficult, which has limited the adoption of the technology. Even more challenging has been encrypting unstructured data, like documents and spreadsheets, which can reside anywhere on a network yet still contain sensitive information. IBE resolves these challenges. Indeed, it makes policy-based encryption very easy to implement by embedding policy in encryption keys and requiring authentication to get the corresponding decryption keys. The same key management platform can be used for all three cases, so IBE can form the basis for an enterprise-wide key management strategy that can extend easily to include new applications. Clearly, IBE has solved many of the encryption challenges that today’s enterprises face. By embedding policy directly in keys, IBE makes it easy to enforce policy. And by leveraging existing IAM infrastructure to define identities, IBE easily integrates into existing infrastructures. At long last, encryption will be a key enabling technology that empowers us to ensure data-centric security. Luther Martin is chief security architect at Palo Alto, CA–based Voltage Security, Inc. (www.voltage.com). He is the author of the IETF draft standards on identity-based encryption algorithms and their use in encrypted email, and is a frequent author in the areas of information security, risk management and project management. His interests include pairing-based cryptography, business applications of information security and risk management. He holds a MS degree from The Johns Hopkins University in Electrical Engineering. He can be reached at [email protected]. THE PRIVACY ADVISOR An Interview with an Expert on India and Outsourcing Sagi Leizerov, Ph.D., CIPP, is a Senior Manager with Ernst & Young LLP. He helps lead the firm’s Privacy Assurance and Advisory Services Practice. Leizerov interviews Mark Kobayashi-Hillary, a London-based advisor, writer and researcher who wrote Outsourcing to India: The Offshore Advantage, which was first published by Springer in 2004 and then updated to a new edition in 2005. Kobayashi-Hillary is a board member of the UK National Outsourcing Association with special responsibility for offshoring. He is a founding member of the British Computer Society working party on offshoring. He also is a visiting lecturer at London South Bank University where he is focused on contributing outsourcing knowledge to the MBA program. Mark: The immediate myth is that it is 10 times cheaper than doing work in the United States or in Western Europe Sagi: We hear so much — this idea that you can get about data leaks and greater quality/lower price. It violations related to the use is kind of sold as a myth that of information by disgruntled you can have it all basically. employees. What is your You can reduce your running view? Mark: To start with, if you are looking at Sagi Leizerov costs, you can increase prothe kind of legislative differences and ductivity, increase efficiency, re-engineer Mark: In absolute terms there are many the types of framework that you have, your processes — and at the same time, more data leaks from companies in the that is not in place in India. You don’t it is cheaper as well. It sounds impossiU.S., the U.K. and European service have that kind of safety net. There is ble and really, to be honest, it is. It is companies than there are from India. no equivalent of the European Union true that operating costs are lower in an Certainly it is a much more interesting directive on data protection or the U.S. environment like India, but the whole story to write about data leaks from equivalent, the concepts of Safe Harbor. restructuring of the way that you operate Indian companies, but I think that there Even in the most recent information and the fact that you may need to entireis also a sense that because we are talktechnology legislation — which was ly re-engineer your supply chain to fit ing about people who earn a much lower written in 2000 — the idea of data your Indian supplier in the supply chain, wage, essentially the kind of logic goes protection was not included, so there or you may need to completely restructhat if we are talking about bribing insidis an immediate difference there in ture the way you are doing business. ers to bring data out of a company, then that you don’t have that legal kind of essentially it should be much cheaper to framework around you to start with. do that. That is the kind of key worry that Sagi: Can you describe NASSCOM That means that the environment is and its role? people have when they look at a place very much one of the private sector. like India. But if you wanted to do a The companies themselves actually Mark: NASSCOM is the National run-down of the most data leaks, have to demonstrate the capability Association of Software and Service probably you would find the U.S. at the rather than there being a law that Companies, and it is a Chamber of top anyway. they’ve got to adhere to. Commerce. It is representation of the IT The other sort of real services industry in India. It’s got more Sagi: When you talk to major difference in working in than 1,000 member companies. They executives about the an environment such as India actually have been around since the potential or the process of is you are going to work in a ‘80s, so they are quite well-established, outsourcing to India, what developing country. You’ve and given that their membership is 95 would be some of the still got quite an extreme polior 96 percent of the Indian high-tech IT common myths that you cy in some parts of the counand service industry, they are the voice hear from them and what are try, and so what you will actuof the industry. NASSCOM has been the realistic expectations as ally see is that the corporathey relate to outsourcing tions have to build a lot of the See, India and Outsourcing, page 8 Mark Kobayashi-Hillary business there? infrastructure required to Sagi: Can you describe some of the key differences from a privacy and data protection perspective that are more obvious about doing business in the EU, the U.K. and the U.S. and India? Is there a specific India risk that we should be aware of? deliver the service that they are doing for you. 7 March • 2007 India and Outsourcing continued from page 7 that is mine rather than outsourcing my services to a vendor? instrumental in actually trying to obtain changes to the IT Act of 2000. They have tabled amendments that they would like to make to the legislation to improve the situation around intellectual property and data protection, and it is true that it is basically sitting with the government at the moment. It is something that is promised to be introduced. Mark: That question changes depending on each company and the exact details of the type of service they are trying to offshore. In general, I guess what we have observed in the marketplace is that where there is a great deal of personal data or data that could be utilized in some way, whether that is personal data about plants or about the business that the company performs, quite often we have seen that offshored rather than outsourced. I am thinking the best example is within investment banking, where you are looking at quite a lot of banks that have chosen to set up their own facilities. They have their own office located in India and they hire their own staff and put those people on their own contract. Sagi: NASSCOM has been pushing for more self-regulation opportunities for its constituents. Can you describe some of the activities and some of the actions NASSCOM has been taking from a selfregulation perspective for its members? Mark: India and the high-tech industry have exploded since the millennium, and they have embraced data protection. They have taken on this role almost like policemen of the industry. They have taken on the role of training the law enforcement officers in India, so NASSCOM is actually now working its way through training the police in India to understand cybercrime and problems around information technology. More importantly, they have set up a national skills registry — which was really a reaction to some of the data leaks that we have seen. They have tried to create this idea that people who work in the industry in India want to be trusted. So they have created a safe harbor where you can upload your resumé basically, so it is a complete history of where you have worked, who you have worked with, references you can give about the quality of your work. So if you are working within a BPO company (Business Process Outsourcing), then it becomes the de facto standard that the employer will check this National Skills Registry and have a look at your verified background before hiring you. Sagi: If I am a Western company concerned about privacy and data protection, does it make more sense for me to offshore my operations to create a sub-company or an additional company 8 Sagi: OK, so I have made the decision to outsource my services to an Indian company. What kind of steps should I be taking before I am selecting a vendor to work with? What would be the type of due diligence, the type of review, that I should do when selecting potential outsourcing companies? Mark: Make sure that you know who they are hiring and where they are coming from so that you can get verified backgrounds from the NASSCOM skills registry. If you are going out on the ground in India, you need to make at least a couple of visits to each location where you are considering possibly using them. The typical kind of visit as a potential customer will be with the CEO coming down to welcome you at the gate and giving you a tour of the facilities. But I would say that definitely you should also come back unannounced. Ask to see the boss again the next day when they are not expecting you to show up. See if you can still observe all the same security procedures in place in that environment. Sagi: Have you been familiar with stories of that type of second unannounced visit that yielded other information? Mark: I have certainly shown up at a couple of BPOs myself. There can be a difference definitely between the kind of unannounced visit where you just walk in, and then where you are actually greeted at the gate by the head of the company. At one particular company in Chennai, I just strolled into the campus. There was a security guard who was supposed to be checking for USB keys, cameras, phones, any kind of recording device. But I gave him just one item, which was enough to keep him happy. I gave the guy my laptop computer, but I still had a phone in my pocket and a couple of USB keys. You need to make sure that there is not just a façade of security and that it is actually a reality. The only way you can really do that is just to test them out yourself. Don’t miss Part 2 of this Q&A next month in the Advisor. The entire interview is available for sale on the IAPP’s Web site, www.privacyassociation.org. © 2007 KPMG LLP, a U.S. limited liability partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. Privacy. It’s your business. Privacy and data governance can be a compliance cost or a business enabler. KPMG helps our clients understand, prioritize, and control the risks associated with the use, transfer, storage, or management of critical information assets. Our global team provides a full range of privacy advisory services with a multidisciplinary approach that uses formalized regulatory, forensic, and technology methodologies. It’s a valuable combination that can help your business. For information, contact Doron Rotman, National Privacy Service Leader, IT Advisory at 650-404-4176, email [email protected]. www.us.kpmg.com March • 2007 Ask the Privacy Expert Readers are encouraged to submit their questions to [email protected]. We will tap the expertise of IAPP members to answer your questions. Elise Berkower, CIPP Q A Do any laws cover the sending of marketing messages to cell phones? In the U.S. there are some statutory and regulatory restrictions on sending promotional messages to cell phones and other wireless devices. (Much of the impetus for regulation arose from the fact that consumers have to pay to receive these messages.) The laws and rules that intersect in this space are CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing Act) (15 USC §§7701-7713) and the Federal Communications Commission’s (FCC) Wireless Email Rule (64 CFR §64.3100), which was promulgated pursuant to CAN-SPAM and covers “mobile service commercial messages”; and the Telemarketing and Consumer Fraud and Abuse Prevention Act (TCFAP) (15 USC §6101-6108), the Telephone Consumer Protection Act (TCPA) (47 USC §227), and the Telemarketing Sales Rule (TSR) (16 CFR §310.1 et seq.) along with the national Do Not Call registry that the Federal Trade Commision (FTC) maintains (www.donotcall.gov). Some states also have their own Do Not Call registries, so telemarketers have to be familiar with those laws, too. The easiest way to figure out which laws and rules apply to a promotional message is to look at the destination to which the message is being sent. If the destination is an email address — with a “@” and a domain — 10 scriber’s signature and the CAN-SPAM and the electronic mail address to FCC’s wireless email rule which MSCMs may be apply. If the destination is sent. Senders who choose a telephone number, then to obtain authorization in the TCFAP, TCPA and oral format also are expectTSR apply. ed to take reasonable steps CAN-SPAM covers to ensure that such authoritraditional email meszation can be verified. sages, as well as text Because the consent (also known as SMS or standard for sending Mobile Short Message Service) Elise Berkower, CIPP Service Commercial messages, and MMS Messages is so high, the usual practice (Multi-media Messaging Service) mesis for commercial emailers and Email sages that contain graphics, video and Service Providers (ESPs) to block all audio components. These formats all emails going to the domains listed on fall within the FCC’s definition of a the FCC’s Wireless Domain Registry. “Mobile Service Commercial But, in its “Primary Purpose” Rule Message” (MSCM), assuming that the (16 CFR §316.3), the FTC recognized primary purpose of the message is that emails can contain mixed content, commercial. i.e., both commercial content and Under CAN-SPAM, wireless servcontent that is not commercial. If an ice providers were supposed to create analysis of a message intended to be special domains for their customers to sent to an email address that contains use for sending and receiving “mobile a domain listed on the FCC’s Wireless service messages.” These specific Domain Registry concludes that the domains are required to be listed on primary purpose of a mixed content the FCC’s Wireless Domain Registry message is NOT commercial, then the (available at www.fcc.gov/cgb/policy/ sender doesn’t need the recipient’s DomainNameDownload.html). If the primary purpose of a “mobile express consent to send it. It should be noted that the “express consent” service message” is commercial, the requirement does not pertain to forsender needs “express prior authorizawarded messages, unless there’s an tion” from the recipient to send it. inducement or consideration offered “Express prior authorization” can be for forwarding the message. obtained by oral or written means, The TCPA and TSR also cover teleincluding electronic methods. A sender marketing SMS (text) as well as voice may obtain the subscriber’s express messages. prior authorization to transmit MSCMs The TCPA was enacted in 1991 to that subscriber in writing. Written to address certain telemarketing authorization may be obtained in paper practices, including calls to wireless form or via an electronic means, such telephone numbers, which Congress as an electronic mail message from the found to be an invasion of consumer subscriber. It must include the sub- “As marketers seek to utilize new technologies to promote their products, they need to become familiar with existing laws under which their activities may fall, as well as to keep abreast of new legislation that may affect the ways they interact with their existing and prospective customers.” THE PRIVACY ADVISOR Privacy Classifieds privacy and even a risk to public safety. The TCPA specifically prohibits calls using an automatic telephone dialing system or artificial or prerecorded message “to any telephone number assigned to a paging service, cellular telephone service, specialized mobile radio service, or other common carrier service, or any service for which the called party is charged.” (47 USC §227[b][1][A][iii]). The TCPA defines an “automatic telephone dialing system” as “equipment which has the capacity (A) to store or produce telephone numbers to be called, using a random or sequential number generator; and (B) to dial such numbers.” (47 USC §227[a][1]) The CAN-SPAM Act provides that “[n]othing in this Act shall be interpreted to preclude or override the applicability” of the TCPA. (15 USC §7712[a]). In 2003, the FCC released a Report and Order in which it reaffirmed that the TCPA prohibits any call using an automatic telephone dialing system or an artificial or prerecorded message to any wireless telephone number. This includes both voice calls and SMS text messaging calls to wireless phone numbers. The Telemarketing and Consumer Fraud and Abuse Prevention Act (TCFAP) gave the FTC the authority to promulgate the Telemarketing Sales Rule (TSR) (16 CFR §310.1 et seq.). The TSR prohibits telemarketers from engaging in various deceptive acts or practices, and imposes recordkeeping requirements. One section of the TSR created the National Do Not Call Registry (16 CFR §310.4[b][1][iii][B]). If a wireless telephone number is listed on the National Do Not Call Registry, a marketer is prohibited from calling that number unless it has an “established business relationship” with the consumer. An “established business relationship” is defined as “a relationship between a seller and a consumer based on (1) The con- sumer’s purchase, rental, or lease of the seller’s goods or services or a financial transaction between the consumer and seller, within the eighteen (18) months immediately preceding the date of a telemarketing call; or (2) The consumer’s inquiry or application regarding a product or service offered by the seller, within the three months immediately preceding the date of a telemarketing call.” (16 CFR §310.2[n]). As marketers seek to utilize new technologies to promote their products, they need to become familiar with existing laws under which their activities may fall, as well as to keep abreast of new legislation that may affect the ways they interact with their existing and prospective customers. Elise Berkower, an attorney and CIPP, is the Executive Vice President of Privacy Strategy at Chapell & Associates, a leading strategic consulting firm focusing on privacy, marketing and public policy. Prior to joining Chapell & Associates, she served as DoubleClick’s Senior Privacy Compliance Officer for six years, helping DoubleClick’s ad serving, search, Web site analytics, email and direct marketing clients address privacy issues. She participates in many privacy and technology industry groups, and is a member of the Advisory Board of The Privacy Advisor. She can be reached at [email protected]. This response represents the personal opinion of our expert (and not that of his/her employer), and cannot be considered to be legal advice. If you need legal advice on the issues raised by this question, we recommend that you seek legal guidance from an attorney familiar with these laws. The Privacy Advisor is an excellent resource for privacy professionals researching career opportunities. For more information on a specific position, or to view all the listings, visit the IAPP’s Web site, www.privacyassociation.org. AVP, PRIVACY INCIDENT RESPONSE Countrywide Woodland Hills, Calif. MANAGER, PRIVACY Western Union Englewood, Colo. CHIEF PRIVACY OFFICER, SENIOR COUNSEL Roche Pharmaceuticals Nutley, N.J. COMPLIANCE MANAGER Entertainment Software Rating Board (ESRB) New York, N.Y. SENIOR HEALTHCARE PRIVACY ANALYST - TMA PRIVACY OFFICE Axiom Resource Management, Inc. Falls Church, Va. CLIENT SERVICES MANAGER TRUSTe San Francisco, Calif. PRIVACY COMPLIANCE SPECIALIST ATB Financial Edmonton, Alberta - CANADA CONSULTANT OR SENIOR CONSULTANT, PRIVACY Deloitte Toronto, Ontario - CANADA COMPLIANCE ANALYST I TRUSTe San Francisco, Calif. PRIVACY PROJECT COORDINATOR Allstate Insurance Northbrook, Ill. 11 March • 2007 Regulator Chat The Privacy Advisor Interviews Richard Thomas, the UK’s Information Commissioner and a Keynote Speaker at the IAPP Privacy Summit 07, about his Priorities and Accomplishments Internet use. This can often be in ways which are invisible or not obvious to ordinary individuals as they are watched and monitored, and the report shows how pervasive surveillance Thomas: As Information Commissioner my looks set to accelerate in the years to come. role is to promote people’s access to official As ever-more information is collected, information and protect people’s privacy. shared and used, it intrudes into our private On the privacy side my Office enforces space and leads to decisions which directly the Data Protection Act and the Privacy and influence people’s lives. Mistakes can also Electronic Communication Regulations. easily be made with serious consequences — These implement for the United Kingdom false matches and other cases of mistaken two European Union Directives which proidentity, inaccurate facts or inferences, suspivide a broadly harmonized approach across cions taken as reality, and breaches of security. all 27 EU countries. The Data Protection At the conference, Data Protection and Act safeguards the handling of personal Privacy Commissioners from around the information and provides important rights. In Richard Thomas world agreed on a communiqué that set out most situations, individuals can find out what how we will ensure privacy is effectively protected in the information the state and other organizations hold about surveillance society. My Office will shortly publish a follow-up them and get it corrected if that information is wrong. Some report to identify the next steps we will take as a regulator 22,000 people contact my Office each year because they in this important area. feel their privacy and other rights may have been infringed. My Office also enforces the UK Freedom of Information TPA: One of your priorities has centered on ‘pre-texting’ or Act. This is relatively new legislation, but we have already ‘blagging.’ Can you tell us more? played a major role in ensuring more and more official information is in the public domain, from farm subsidies to travel Thomas: Yes — in the UK we use the term blagging. expenses for Members of Parliament. Personal information is usually obtained by making payments to staff or impersonating the target individual or another offiTPA: Your Office recently published a well-publicized report cial. Some victims are in the public eye; others are entirely on a Surveillance Society. Can you describe the report? private citizens. Last year, I urged the UK Government to amend the Thomas: In November I was delighted to host the 28th Data Protection Act and introduce a jail term for those conInternational Data Protection and Privacy Commissioners’ victed of obtaining and selling personal information. Conference in London. I called for a public debate on the We uncovered an existence of a widespread industry implications of living in a surveillance society and I gave a devoted to illegally buying and selling people’s personal inforserious warning that we are waking up to a surveillance socimation. I issued a special report to the UK Parliament, ‘What ety. The theme struck a chord within the UK and worldwide. Price Privacy?’ which explained how some individuals trade To coincide with the conference, we published ‘A people’s personal information, such as current addresses, Surveillance Society’ — a detailed report on surveillance now details of car ownership, ex-directory telephone numbers or and projections for what our society might be like in 2016. It records of calls made, criminal records and bank account describes a surveillance society as one where technology is details. Private investigators, tracing agents and their operaextensively and routinely used to track and record our activitives — often working loosely through several intermediaries ties and movements. This includes systematic tracking and — are the main suppliers. recording of travel and use of public services, automated use The ultimate buyers of illegally obtained personal inforof CCTV, analysis of buying habits and financial transactions, mation include journalists, financial institutions and local and the workplace monitoring of telephone calls, email and The Privacy Advisor (TPA): What are your responsibilities in the UK? 12 THE PRIVACY ADVISOR authorities wishing to trace debtors; estranged spouses seeking details of their ex-partner’s whereabouts or finances; and criminals intent on fraud or witness or juror intimidation. The report arises from investigations carried out by my Office, sometimes using search warrant powers. Documents seized during one raid revealed evidence of a large scale market in the trading of personal information. However, the existing penalties are low and do not have a deterrent effect. One major case resulted in conditional discharges for the perpetrators. To highlight the extent of this illegal trade, I also recently published a league table of media publications showing which are the most prolific buyers of unlawfully obtained personal information. The list is based on evidence found in just a single raid that my Office carried out at the premises of a private investigator. Recently the government confirmed that it will amend the UK Data Protection Act. I am delighted the Government has now decided to adopt my proposals to introduce tougher penalties to deter people from engaging in the deliberate misuse of personal information. TPA: What are you doing to help the British people look after their personal information? Thomas: New figures we released in January revealed Britons are leaving themselves vulnerable to identity theft by not taking enough care to protect their personal information. In fact, a fifth believe they have been a victim of identity crime. We conducted a nationwide survey uncovering how easy Britons make it for criminals to steal their identity. A third of those surveyed admitted to throwing away personal documents such as bank statements and receipts without shredding or destroying them, a quarter of people do not routinely check bank statements for unfamiliar transactions and almost half of those surveyed use the same PIN and password across different accounts. The research was published to coincide with the launch of a personal information toolkit, aimed at helping individuals protect their personal information more easily. We are encouraging people to use the personal information toolkit which provides individuals with advice and tips on protecting their information. “Britons are leaving themselves vulnerable to identity theft by not taking enough care to protect their personal information. In fact, a fifth believe they have been a victim of identity crime.” TPA: And what is the UK government doing? Thomas: Privacy issues are now high on the news agenda in the UK. I used my annual report last year to highlight that data protection provides a valuable framework for sharing personal information across the public sector, and should not be seen as a barrier. This issue is now central to many high profile UK government initiatives, such as identity management, health and education. There are clear benefits to sharing more information — safeguarding the public, improving services and reducing costs. However, I have stressed that government and other public bodies must retain public trust and confidence, and will only achieve this if they share personal information in a secure, lawful and responsible way. I do not want data protection to be wrongly blamed for preventing sensible information sharing, for example to detect crime, protect children at risk or prevent fraud. Electronic government initiatives which improve public services, such as online car tax renewal, show that information can be shared in entirely acceptable ways. But as more and more information is passed from one database to another, it is important to get the basics right. Trust and confidence will be lost if information is inaccurate or out of date, if there are mistakes of identification, if information is not kept securely or if reasonable expectations of privacy are not met. There must be clarity of purpose — not just sharing because technology allows it. And people must be told how their information is being shared and given choices wherever possible. Data protection should be seen as part of the solution, not as the problem. The eight core principles that underpin the Data Protection Act provide a widely supported framework to make sure personal information is collected in ways which are necessary, justified and proportionate. Getting it right — at both design and operational levels — is vital to ensure the public trust and confidence which is needed to deliver the benefits of information sharing. My Office intends to contribute constructively to government thinking and feed in data protection expertise. It is our job to promote good practice and we will be exploring ways — for example through information-sharing guidelines and promoting statutory codes of practice — to bring greater certainty and clarity to help government achieve the right balance. TPA: And what about Freedom of Information — is it working? Thomas: Since I have been Commissioner, we have seen the introduction of the Freedom of Information Act. The See, Regulator Chat, page 20 13 March • 2007 IAPP in the News Harriet Pearson, IBM’s CPO, Testifies in Support of Bill Banning Genetic Testing Discrimination IAPP Welcomes Our Newest Corporate Members arriet Pearson, CIPP, VP of Corporate Affairs & Chief Privacy Officer, IBM Corporation, and an IAPP board member, recently testified before a House subcommittee during a hearing on “Protecting Workers from Genetic Discrimination.” In October 2005, under Pearson’s guidance, IBM became the first major corporation to add genetics to its discrimination policy, prohibiting “ current or prospective employees’ genetic information from being used in any employment decisions.” Harriet Pearson IBM supports federal legislation preventing discrimination based on genetic information. The bill, which has passed the Senate twice in the past, was reintroduced in the House in January with bipartisan support. If passed, it would give genetic information the same confidentiality as medical records, and make it illegal for employers and insurance companies to use individuals’ genetic information when make hiring or coverage decisions. Pearson’s testimony generated media coverage, including a CNET News piece. H Current and Former IAPP Board Members Appointed to TRUSTe Board of Directors Appointed along RUSTe, an online with Polonetsky to the privacy certification TRUSTe board were two organization, recently other new members: appointed Jules Jonathan Hart, a memPolonetsky, CIPP, Chief ber in the Media and Privacy Officer and Information Technologies Senior Vice President of group at the law firm Consumer Advocacy at Dow Lohnes PLLC, and AOL, and former IAPP Donald Whiteside, Vice board member, to its President of the board of directors. Jules Polonetsky Peter Cullen David Hoffman Corporate Technology Polonetsky joins other Group and Director of IAPP board members TRUSTe’s board of directors Technical Policy & Standards at Intel. on the TRUSTe board, Peter Cullen, consists of 11 members selected for TRUSTe is an independent, CIPP, Chief Privacy Strategist at their strong backgrounds in a variety nonprofit organization that identifies Microsoft Corporation, and David of industries relating to online privacy, trustworthy online organizations Hoffman, CIPP, Group Counsel and trust and business. The board through its Web Privacy Seal, Email Director of Privacy at Intel Corp. oversees the nonprofit’s long-term Privacy Seal and Trusted Download Hoffman is Assistant Treasurer of the strategy and programs. Programs certifications. IAPP Board. T 14 THE PRIVACY ADVISOR UPDATE: Statutory Review of PIPEDA — Interview By Nymity Background: The Standing Committee on Access to Information, Privacy and Ethics is currently conducting interviews in preparation for a report to Parliament on changes to Canada’s Personal Information Protection and Electronics Document Act (PIPEDA). Nymity, on behalf of The Privacy Advisor, recently interviewed Tom Wappel, MP, Scarborough Southwest, who also serves as Chairman of the Standing Committee on Access to Information, Privacy and Ethics. The Privacy Advisor (TPA): How does the regulatory review of PIPEDA process work? What are the goals? Wappel: The act mandated that a Parliamentary Committee review the operation and effectiveness of the act, five years after it came into force. This review was referred to our committee by the House of Commons. Our committee decided to hear from interested stakeholders, the public, the Minister of Industry and, of course, the Privacy Commissioner. The goals are to try to identify if there are any shortcomings in the act, based on the experience since it came into force, and make recommendations to the Minister on how to improve the act. exchange information if it is in furtherance of potential fraud or other criminality; that it be easier for potential purchasers to obtain relevant information from sellers prior to purchase of the business; and that there be some recognition of the speed of development of the information highway; the Tom Wappel potential exploitation of children on the Internet; and the internationTPA: What have been the key areas of al aspects of the Information Age. That is concern by presenters so far? just a short synopsis of some of what we have heard so far. Wappel: Some presenters have felt that the act is more or less fine the way it is. TPA: What are the key areas of concern Others have suggested that the Privacy for the committee? Commissioner have order-making powers; that there be a definition of “work Wappel: The key concern of the commitproduct” contained in the act; that there tee is to ensure that all those who wish be some sort of mandatory security breach notification mechanism; that See, PIPEDA Review, page 16 there be the ability to more readily broadcast for interested parties to indicate to the clerk their interest in either appearing before the committee or submitting a written brief. Respondents also were considered by the steering committee. The goal was to have a broad and diverse group of interveners. TPA: Who is on the committee? Wappel: The Committee is composed of 12 Members of Parliament: 5 Conservatives, 4 Liberals, 2 Bloc Quebecois and 1 NDP member. As you can see, the opposition members outnumber the government members. This is reflective of a minority Parliament. TPA: Who is presenting to the committee and how were they selected? Wappel: The committee, through its Steering Committee, in consultation with the Clerk of the Committee and the committee’s research staff, decided on a list of witnesses, representative of the various groups. An invitation also was 15 March • 2007 PIPEDA Review continued from page 15 to present either do so, submit a brief or have their concerns aired by others. We want to try to make sure that the act will operate in the fairest and most efficient way possible into the future. TPA: What happens after the review is complete? What are the steps to amend PIPEDA? Wappel: Upon the completion of the hearing of evidence, the committee will draft a report to the government. We hope it will be unanimous, but it may not be. There may be concurring reports with additional comments, or there may be dissenting reports, however, there will certainly be a majority report. Once the report is finalized and passed by the committee, it is presented to the House of Commons, for the attention of the government. The usual practice is for the relevant ministry to consider the report and draft a response for approval by its minister, who will then have Cabinet approve the final response, which will be tabled in the House of Commons. This may take up to 180 days approximately. The response usually contains a detailed list of the recommendations of the committee which the government will accept, or reject, with the reasons why. TPA: What happens if an election is called? Wappel: If an election is called before the committee issues its report, the work of the committee is effectively lost. A new Parliament will decide how it wants to deal with the fact that a report on PIPEDA has not been submitted to Parliament, despite the clear wording of the act. Usually, but not always, the new committee would adopt the evidence heard by our committee. But depending on the results of the election and the composition of the new committee, it could be “back to the drawing board.“ If an election is called after the committee reports but before the government response, we would expect that the newly constituted committee would 16 adopt the previous committee’s report, resubmit it to the new House and request a response from the new government. However, there is nothing this committee can do to bind a future committee to a particular course of action. If an election is called after the government issues its response, but before any recommendations are implemented, the newly elected government is not bound to follow the response of the previous government. TPA: When would we expect PIPEDA to be amended? Wappel: It is only a guessing game as to when amendments to PIPEDA would be forthcoming. I would expect that, before any major recommendation were implemented, the ministry would hold consultations with stakeholders to discuss how most efficiently to implement the changes. TPA: In what form would PIPEDA be modified? Could the Canadian Standards Association principles be modified? Wappel: It is too early to comment on the form of modifications to PIPEDA, if any, as we are still hearing evidence and have not yet begun to discuss our draft report. TPA: Have there been any concerns relating to Quebec’s constitutional challenge of PIPEDA? Wappel: The issue of Quebec’s constitutional challenge to PIPEDA has been raised by some witnesses and committee members. As far as we can tell, the matter is stalled in the courts. Until the courts advise otherwise, we have to assume that the act is constitutional. happen. The committee has requested the Minister of Justice to appear before the committee this month, to discuss this issue further. The committee is also aware that the Privacy Act is in need of review and modernization. Party: Liberal Political Experience: First elected to the Parliament of Canada for the Riding of Scarborough West in November 1988 and again in October 1993. Elected to the Parliament of Canada for the Riding of Scarborough Southwest in June 1997, November 2000, June 2004 and January 2006. Chairman, Standing Committee on Access to Information, Privacy and Ethics, Past Chairman of the Standing Committee on Fisheries and Oceans, Member, Subcommittee on the Review of the Anti-Terrorism Act of the Standing Committee on Public Safety and National Security, Past Member and Past Chairman of the Subcommittee on National Security of the Standing Committee on Justice, Human Rights, Public Safety and Emergency Preparedness, Member, Past Chairman and Past Vice-Chairman of the Joint House of Commons and Senate Standing Committee on the Scrutiny of Regulations, Co-Chairman of the Canada-China Legislative Association and Chairman of the Canada-Hungary Parliamentary Friendship Group.Past Member of the Standing Committee on Citizenship and Immigration, Education: University of Toronto, 1971 (B. Arts) (Pol. Sci.); Queen's University, 1974 (L.L.B.); Called to the Bar of Ontario, April 8, 1976 TPA: In closing, what else is on the agenda for the committee? Wappel: The committee’s first report of this Parliament called upon the Minister of Justice to prepare and submit to Parliament a new Access to Information Act, by December 15, 2006, for consideration by the committee. This did not Nymity (www.nymity.com) provides Web-based privacy management support solutions that help organizations manage the risks that lead to a data breach, a privacy complaint and to non-compliance or over-compliance with privacy laws. Congratulations, Certified Professionals! The following individuals successfully passed the CIPP, CIPP/G and/or the CIPP/C exam. Please join the IAPP in saluting these graduates! CIPP Amy R. Adams, CIPP Jennifer Albornoz Mulligan, CIPP David G. Allen, CIPP Terri L. Barrett, CIPP Joseph P. Beckman, CIPP Heidi K. Berger, CIPP Sol Bermann, CIPP Sonia Bhaskar, CIPP Lynn A. M. Bunn, CIPP Cecil Douglas Burden, CIPP Peggy A. Byrne, CIPP Ryan M. Calo, CIPP Jeffrey M. Camiel, CIPP William G. Canellis, CIPP Michael C. Carey, CIPP William E. Carter, CIPP Helen Hoi Lam Chan, CIPP Andersen (Chi-Cheng) Chu, CIPP Frank J. Cindrich, CIPP John Charles Clark, CIPP Nicole Crawford, CIPP Bob F. Dey, CIPP Jacqueline Dixson, CIPP Troy A. Donnelly, CIPP S. Alice Duke, CIPP Stephen Luke Durkee, CIPP Svetlana Earhart, CIPP Jess C. Edwards, Jr., CIPP Christos Ekonomidis, CIPP Margaret Ann Evered, CIPP Lindsey Finch, CIPP Kevin Fitzgerald, CIPP Aaron Fontenot, CIPP Sarah B. Foster, CIPP Mari J. Frank, CIPP Nancy J. Frazee, CIPP Susan Fricks, CIPP Mary C. Gardner, CIPP Jennifer Harkins Garone, CIPP Malcolm L. Gilmore, CIPP Richard P. Goh, CIPP Miguel A. Gonzalez, CIPP Joseph P. Griffin, CIPP John G. Haley, CIPP Della Rose Hareland, CIPP Gregory P. Harry, CIPP William T. (Tony) Higgins, CIPP Brian C. Hobbs, CIPP Eva Hui, CIPP Harvey Jang, CIPP Ingrid Renee Jones, CIPP Max Kelly, CIPP Linda G. King, CIPP Phyllis R. King, CIPP Richard H. King, Jr., CIPP Aaron Gordon Kirby, CIPP Anna Leena Korhonen, CIPP Catherine Kurtz, CIPP Manuj Lal, CIPP Michael Scott Lamberth, CIPP Marion R. Lang, CIPP Steven Poh Heng Lee, CIPP Susan N. Lewis, CIPP Christopher M. Lewis, CIPP Allen Lichtenstein, CIPP Melissa M. Lippay, CIPP Mark D. Lock, CIPP Ray William London, CIPP Edward R. Mallozzi, CIPP Jan McCorstin, CIPP Sally Machiko Miyashita-Garman, CIPP Stephen Lee Mohr, CIPP Joy A. Nelson, CIPP Andy Ng, CIPP Darla Nykamp, CIPP Paul Pascalis, CIPP Mary E. Ranalla, CIPP Christine Reynon Ravago, CIPP Peter J. Reid, CIPP Geoff Richards, CIPP Nancy Elizabeth Richman, CIPP Eileen Marie Rico, CIPP Christine K. Sadlouskos, CIPP Pamela H. Sanchez, CIPP Victoria J. Sayer, CIPP Jose Antonio Sesin, CIPP Kamilah H. Shepherd, CIPP Satnam Singh, CIPP Alice Bradley Snowden, CIPP Marcela Samudio Price Souaya, CIPP Michael Edward Spaulding, CIPP Jacob Gregor Springer, CIPP David Andrew Stampley, CIPP Stephen L. Thomas, CIPP Joel Ford Tietz, CIPP Richard Uku, CIPP Mary S. Violi, CIPP Bobby Whitaker, CIPP Guy Williams, CIPP Anne E. Wolfe, CIPP Janet B. Wright, CIPP Ruth M. Zikaris, CIPP Sylvanus Arnold Zimmerman, CIPP CIPP/G Margaret Louise Alston, CIPP/G Aldo Francisco Castaneda, CIPP/G Rebecca Farr, CIPP/G Laura Helen Gilbert, CIPP/G Victor A. Loy, CIPP/G Judy Macior, CIPP/G Joseph Sabriam Marsh, CIPP/G Adegbola Ajibade Odutola, CIPP/G Annette C. Orr, CIPP/G Larah D. Payne, CIPP/G CIPP/C Edmund Jason Albert, CIPP/C Barbara Heather Bain, CIPP/C Parvathi Belur, CIPP/C Shannon Branton, CIPP/C Nicole Breeze, CIPP/C Nigel Brown, CIPP/C Susan Elizabeth Buchanan, CIPP/C Alec Campbell, CIPP/C Abigail Carter, CIPP/C Yim Chan, CIPP/C Chris Close, CIPP/C Don Lloyd Cook, CIPP/C Laura Davison, CIPP/C Samuel Domski, CIPP/C Fraser Duff, CIPP/C Francis Duffy, CIPP/C Andreas Faruki, CIPP/C Douglas Fawcett, CIPP/C Anita Fineberg, CIPP/C Michael Edward Fliegel, CIPP/C Marnie Fletcher, CIPP/C Anick Fortin-Cousens, CIPP/C Christyne Gauthier, CIPP/C Mark Desmond Gilligan, CIPP/C Charles Calogero Giordano, CIPP/C Robin Gould-Soil, CIPP/C Keren Groll, CIPP/C Katherina Groves, CIPP/C Jeff Green, CIPP/C Gail Guimont, CIPP/C Tanmay J. Gupta, CIPP/C Karina Guy, CIPP/C Moyra Jean Hamilton, CIPP/C Steven J. Heck, CIPP/C Andre Hiotis, CIPP/C Esther Hoh, CIPP/C Mitchell Rex Hoppenworth, CIPP/C Johnathan W. Hunt, CIPP/C Constantine Nicolas Karbaliotis, CIPP/C Cynthia E. Kenny, CIPP/C Sylvia B. Kenyon, CIPP/C Jennifer Alexis Kerr, CIPP/C Johnna Koso, CIPP/C Anne-Marie Latulippe, CIPP/C Paul Lewis, CIPP/C Sanda M. Lobo, CIPP/C Jay Loder, CIPP/C Karen Marie Massie, CIPP/C Judy Macior, CIPP/C Drew McArthur, CIPP/C Terry McQuay, CIPP/C Lorene Novakowski, CIPP/C Isabelle Ouellet, CIPP/C Anna Paton, CIPP/C Jill A. Phillips, CIPP/C William Rea, CIPP/C Nancy Rector, CIPP/C Alain Rocan, CIPP/C Franice Rousseau, CIPP/C John Kilian Searle, CIPP/C Della Shea, CIPP/C Anna Sheehan, CIPP/C Donald E. Sheehy, CIPP/C David T. Shuen, CIPP/C Lynn Ann Siverd, CIPP/C Jo-Ann Smith, CIPP/C Sandra O. Smith-Frampton, CIPP/C Jane Stubbington, CIPP/C Kerry-Ann Sween, CIPP/C Barbara M. Switzer, CIPP/C Richard G. Taylor, CIPP/C David J. Todd, CIPP/C Henry Tom, CIPP/C Catherine J. Travers, CIPP/C Stephen Turnbull, CIPP/C Peter Viveiros, CIPP/C Ron Wadey, CIPP/C Jean-Francois Willis, CIPP/C Bernard Woo, CIPP/C Carolyn C. Worthington, CIPP/C Stenly Yuen, CIPP/C 17 March • 2007 Privacy News Survey Reveals Lack of Medical Identity Theft Awareness esults of a survey sponsored by EpicTide, a provider of security solutions for the healthcare industry, yielded some interesting findings about consumer awareness of medical identity theft and patient safety concerns. The survey questions were designed to elicit information from consumers about the rate of medical identity theft; understanding of their patient rights; and perceptions regarding the ability of healthcare organizations to protect patient records, ensure patient safety and report security breaches. One of the key findings, according to the survey, is that nearly half of the survey participants had never heard of medical identity theft — despite the increase in medical ID theft and recent media coverage. Consumers also are mostly unaware of the consequences associated with medical identity theft, the survey found. Although respondents were somewhat able to identify examples of medical ID theft, the survey R Consumer responses to a survey asking whether they believe their healthcare providers know when someone accesses their medical records • One in two consumers believe their healthcare provider does not know when someone accesses their medical records. • 39.9 percent of consumers feel confident that their healthcare providers are able to secure their medical records and personal information. • 50.1 percent feel their healthcare providers are effective in protecting their medical records. Source: EpicTide concludes that additional consumer education is needed. Another critical finding of the survey is that there is a great deal of confusion among participants as to their privacy rights. Although all doctors’ offices, pharmacies and medical organizations require patients to sign a HIPAA notice, only 53 percent of survey respondents reported being asked to sign a notice of their HIPAA rights at a doctors’ office, hospital, pharmacy or other medical organization. Additionally, half of the participants responded that they did not Consumer Beliefs Regarding the Consequences of Identity Theft • 92.7 percent of respondents associate receiving bills for medical care that they did not receive as a possible consequence of medical identity theft. • 83.5 percent of respondents associate increased cost of medical insurance as a possible consequence of medical identity theft. • 82 percent of respondents associate increased cost of overall medical care as a possible consequence of medical identity theft. • Only 75 percent of respondents associate altered medical records such as allergies or blood type or severe medical errors, complications or death as possible consequences of medical identity theft. • 70.8 percent of respondents agree that medical identity theft is a cause of rising healthcare costs. Source: EpicTide 18 “The majority of survey respondents do not feel that healthcare providers are diligent about informing patients of suspected security breaches.” read the HIPAA notices that they have been asked to sign. The survey goes on to reveal that the greatest misperception reported in regard to patient rights is that participants believed that “employees of healthcare organizations may legally access or view their records without written consent for reasons other than providing care or medical goods, or for billing/payment purposes.” The survey also asked participants a series of questions regarding the responsibility of healthcare organizations in reporting security breaches. While just more than 98 percent responded that healthcare providers should be accountable for informing patients if they suspect patient records have been accessed or compromised without authorization, 70.8 percent do not believe that healthcare providers are diligent about informing patients of suspected security breaches. More information on accessing the survey is available at www.epictide.com. THE PRIVACY ADVISOR A Day in the Life of an Entrepreneur: Nymity’s Terry McQuay VeriChip Completes IPO T eriChip, which develops, markets and sells radio frequency identification, or RFID, systems used to identify, locate and protect people and assets, recently announced the pricing of its initial public offering. The company is offering 3,100,000 shares of its common stock at $6.50 per share, before underwriting discounts and commissions. VeriChip’s common stock will be traded on the NASDAQ Global Market under the symbol “CHIP”, according to a company news release. Merriman Curhan Ford & Co. is the book-running manager for the offering and C.E. Unterberg, Towbin and Kaufman Bros., L.P. are co-managers. In addition to the shares being offered by VeriChip, Applied Digital Solutions, Inc., the company’s largest shareholder, has granted the underwriters a 30-day option to purchase up to an additional 465,000 shares of the company’s common stock to cover overallotments, if any. The offering of these securities is made only by means of a prospectus, copies of which may be obtained from Merriman Curhan Ford & Co., 600 California St., San Francisco, Calif., 94108 (telephone 415-248-5600 or fax: 415-248-5690). he Toronto Star recently caught up with Terry McQuay, CIPP, CIPP/C, founder of Nymity, a startup information technology company providing online Terry McQuay risk management solutions related to privacy issues and regulatory compliance. After being tapped by The Star as a finalist in its “2007 Build a Business Challenge,” Nymity was approached by venture capital firm, Ventures West, which saw an opportunity in Nymity, especially given the growth of privacy legislation and a newly implemented Canadian law requiring companies to have a privacy officer. The Star profiled McQuay as he sat down with Robin Axon of Ventures West and explained the origin of Nymity and its growth. The article follows McQuay through a bevy of meetings on topics ranging from revamping Nymity’s Web site, to analyzing its pricing strategy to identifying a spokesperson for the business. The full article is available at www.nymity.com/about_us/TheStar.asp. Cavoukian Calls for Privacy Legislation in Ontario ntario Information and Privacy Commissioner Ann Cavoukian again pushed for privacy legislation in the province in reaction to comments from Government Services Minister Gerry Phillips. Phillips has called upon the Canadian government to force banks and retailers to notify customers about privacy breaches, but Cavoukian is in favor of provincial legislation addressing breach notification and other privacy issues. Ontario is the only one of Canada’s four largest provinces that does not O currently have private-sector privacy legislation. B.C., Alberta and Quebec currently have legisAnn Cavoukian lation in place. In a news release issued by her office, Cavoukian stated, “Instead of pointing to Ottawa, Ontario should be taking responsibility for bringing in its own legislation (like the three provinces cited), that will address Ontario’s privacy needs, including a key provision to require breach notification.” Americans Vote USPS #1 for Privacy he United States Postal Service was rated the number one agency Americans trust to protect their privacy, according to the “2007 Privacy Trust Study of the United States Government” conducted by The Ponemon Institute LLC. This is the third year in a row that the USPS held the top spot, attaining a privacy trust score of 83 percent. Results also T V showed that the USPS increased customer satisfaction and trust scores from last year. The study, which surveyed more than 7,000 people, identified 10 key factors — from a sense of security when providing personal information to Web site security to access to personal information — when ranking 60 federal agencies. The purpose of the study is to gauge Americans’ confidence level in the government agencies that routinely collect and use citizens’ personal information. 19 March • 2007 Calendar of Events MARCH 6-9 19 IAPP Privacy Summit 07 Renaissance Washington DC Hotel More information is available at www.privacysummit.org. 6 IAPP Certification Training CIPP/G and CIPP/C Part I: 2 p.m. 7 IAPP Certification Training CIPP: 8 a.m. CIPP/C Part II: 1 p.m. 9 IAPP Certification Exams CIPP and CIPP/C exams: 7:15 a.m. CIPP/G exam: 10:30 a.m. 13 IAPP KnowledgeNet — Toronto, Canada Speaker: Dr. Ann Cavoukian, Ontario Information and Privacy Commissioner Can You Read Me Now? The Privacy Implications of RFID. 23 Australian Law Reform Commission (ALRC) Public Forum Is Privacy Good Business Sense? Sydney Masonic Centre Sydney, Australia More information is available at www.alrc.gov.au/inquiries/current/ privacy/syd.htm. IAPP KnowledgeNet — Seattle, Wash. Speakers: Lynn Majors, CIPP, Principle Privacy Officer, T-Mobile, Debra Overlin, Director-HR Data Privacy, Boeing Corp., and Rob Gratchner, Director of Privacy, aQuantive, Inc. Implementing a Privacy Training Strategy. 26-27 14th National HIPAA Summit Hyatt Capitol Hill Washington, D.C. To list your privacy event in the The Privacy Advisor, email Ann E. Donlan at [email protected]. 26 IAPP Certification Training 8 a.m. 27 IAPP Certification Exams 2 p.m. Regulator Chat continued from page 13 public has a right to know what is done in their name with their taxes. This is a hugely important piece of legislation and is opening up more and more information to public scrutiny. My Office has published some powerful rulings on a wide range of issues including the cost of identity cards, Legionnaires disease, academic standards and salaries of senior officials. It is extremely encouraging to see the positive impact the Freedom of Information act is having on individuals. A great deal of information has been released since the introduction of the act, which would not otherwise have been in the public domain. I was delighted that Parliament’s Constitutional Affairs Select Committee concluded that freedom of information was proving to be a significant success. Since the Act came into force, the ICO has received some 5,000 complaints and closed around three quarters of these cases. TPA: What are some of the privacy issues on the horizon from your perspective? 20 29 IAPP KnowledgeNet — Washington, D.C. Speaker: Hugo Teufel III, Chief Privacy Officer, Department of Homeland Security APRIL 4 IAPP KnowledgeNet — Boston, Mass. Joel Winston, Associate Director, Division of Privacy and Identity Protection, Bureau of Consumer Protection, Federal Trade Commission 4 IAPP KnowledgeNet — Minneapolis/St. Paul, Minn. Paul H. Luehr, Managing Director, Stroz Friedberg, LLC Responding to Data Breaches: A Forensic Perspective. 11 IAPP KnowledgeNet — New York, N.Y. Speaker: Gary Kibel, Attorney for Davis & Gilbert Privacy, Social Media and User Generated Content. Thomas: There is no doubt that privacy issues continue to rise fast up the agenda — politically and commercially — in the United States and worldwide. People want their privacy and personal information properly respected. Businesses and governments want to get it right. Computing power gets ever-stronger. There can be very difficult balances to draw, especially where there may be tensions with the battles against terrorism and serious crime. My Office’s overall approach is to take a practical and down-to-earth approach — simplifying and making it easier for the majority of organizations that seek to handle personal information well, but tougher for the minority who do not. One of the major hot topics is the current lack of synergy between privacy laws around the world. As pressures build for a clearer legal framework within the U.S., I want to remind everyone of the benefits of maximum global harmonization. Equally, I recognize that the EU Data Protection Directive is widely seen as excessively bureaucratic and prescriptive, not always concentrating on the priority real risks to individuals. There are current initiatives in Europe to make data protection more effective and better communicated in practice. We may not yet meet in the middle, but how much scope is there to move closer?