Overview of Key E.U. and U.S. Privacy and Cybersecurity Laws. Brett Lockwood Smith, Gambrell & Russell, LLP May 15, 2018

Similar documents
General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

Top Five Privacy and Data Security Issues for Nonprofit Organizations

BHBIA New Data Protection Rules. Pharma Company Perspective. Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD

EU General Data Protection Regulation (GDPR) Achieving compliance

GDPR compliance: some basics & practical to do list

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Data Protection Policy

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

NYDFS Cybersecurity Regulations

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Website Privacy Policy

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

GDPR: A QUICK OVERVIEW

Cloud Computing, SaaS and Outsourcing

PS Mailing Services Ltd Data Protection Policy May 2018

Google Cloud & the General Data Protection Regulation (GDPR)

MOBILE.NET PRIVACY POLICY

Legal Considerations and Case Studies

General Data Protection Regulation (GDPR)

Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

Managing Cybersecurity Risk

Accelerate GDPR compliance with the Microsoft Cloud

I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE

Islam21c.com Data Protection and Privacy Policy

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Learning Management System - Privacy Policy

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

Another Cook in the Kitchen: The New FAR Rule on Cybersecurity

Cybersecurity The Evolving Landscape

Element Finance Solutions Ltd Data Protection Policy

DOD s New Cyber Requirements: Impacts on DOD Contractors and Subcontractors

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Eco Web Hosting Security and Data Processing Agreement

Creative Funding Solutions Limited Data Protection Policy

Vistra International Expansion Limited PRIVACY NOTICE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

Cisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

DATA PROCESSING TERMS

GDPR and the Privacy Shield

Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

Our agenda. The basics

General Data Protection Regulation for ecommerce. Reach Digital - 18 december 2017

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

ADIENT VENDOR SECURITY STANDARD

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

HIPAA-HITECH: Privacy & Security Updates for 2015

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

EU GDPR & ISO Integrated Documentation Toolkit integrated-documentation-toolkit

U.S. Private-sector Privacy Certification

Regulation P & GLBA Training

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

NE HIMSS Vendor Risk. October 9, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS

Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification

Changing times in Swiss Data Privacy: new opportunities? Microsoft Security Day 27 April 2017 Clara-Ann Gordon

GENERAL DATA PROTECTION REGULATION (GDPR)

This Webcast Will Begin Shortly

Integrating Information Security Protections In Supplier Agreements: Guidance for Business and Technology Counsel

Data Processing Agreement

Data Privacy & Protection in the EU-U.S.

THE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE

Cybersecurity Auditing in an Unsecure World

The Role of the Data Protection Officer

OUR SECURITY POLICY & GDPR

German Data Processing Addendum MailChimp

Hot Topics in Privacy

Hot Topics in Privacy

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

Emsi Privacy Shield Policy

Altius IT Policy Collection Compliance and Standards Matrix

General Data. Protection Regulations MAY Martin Chapman Head of Ops & Sales Microminder. Presentation Micro Minder Ltd 2017

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

Data Protection policy

Platform Privacy Policy (Tier 2)

Data Processing Agreement

HIPAA Privacy, Security and Breach Notification

Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014

What You Need to Know About Addressing GDPR Data Subject Rights in Pivot

Putting It All Together:

Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World. September 20, 2017

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Spring Mobile Mini UK Ltd. Privacy Policy Spring 2018

UWTSD Group Data Protection Policy

ZIMBRA & THE IMPACT OF GDPR

Workday s Robust Privacy Program

HPE DATA PRIVACY AND SECURITY

CD STRENGTH LLC. A MASSACHUSETTS, USA BASED COMPANY

Data Protection Policy

PRIVACY POLICY. 1. Introduction

Transcription:

Overview of Key E.U. and U.S. Privacy and Cybersecurity Laws Brett Lockwood Smith, Gambrell & Russell, LLP May 15, 2018

Agenda Principal Obligations Under GDPR Key U.S. Privacy & Cybersecurity Laws E.U. / U.S. Comparison Evolving Compliance & Risk Management Practices

GDPR Obligations Summary GDPR effective May 25, 2018 Broad scope / very process oriented Builds on Privacy Directive, with many new provisions, including enhanced personal rights, affirmative consent, data breach notice and DPO requirements Penalties greater of 20 MM or up to 4% of worldwide revenue

GDPR Obligations Major Requirements Privacy by Design Principles Notice to EU individuals of data collection practices Informed affirmative consent needed to process data if no other lawful basis (e.g., legitimate interest ) EU individuals have right to access, correct and request erasure of data and withdraw consent Must implement technical and organizational measures to safeguard personal data

GDPR Obligations Major Requirements Contractors handling data (processors) must adhere to contractual clauses (of controllers) Data breach notice within 72 hours to supervisory authorities (without undue delay to individuals) Companies with large scale processing or monitoring of personal data must have a data protection officer Personal data transfers outside the EU only allowed where adequate level of protection assured -- Model clauses, BCRs, U.S.-E.U. Privacy Shield

Key U.S. Laws Federal Level No overarching law such as GDPR More of a sector approach Financial Services, Healthcare, Education, Public Companies and General Business Key Agencies: OCC, HHS OCR, SEC, CFPB & FTC

Key U.S. Laws Federal Level FTC filling void for general businesses, such as manufacturers Focus on policing deceptive and unfair trade practices under the FTC Act Evolving common law of privacy Key requirement: reasonable security measures per prevailing industry practices Uncertainty: pending LabMD case

Key U.S. Laws Federal Level U.S.-E.U. Privacy Shield Program Option for U.S. companies processing data on E.U. data subjects Privacy by design principles (Notice, Choice, Accountability, Security, Data Integrity, Access & Recourse Must post online Privacy Shield Statement Administered by U.S. Dept. of Commerce and selfcertified annually

Key U.S. Laws State Level All States, D.C., Puerto Rico, Guam & Virgin Islands have breach notification laws (but many variations) Scope of PII, Timing, Notice Content, Agency Notices, Encryption Exceptions, Risk of Harm Threshold, Regulated Industries Exemption Thirteen states (AR, CA, CT, FL, IN, MD, MA, MN, NE, NM, OR, RI, TX, UT) impose affirmative data security obligations must implement reasonable administrative and technical protections

Key U.S. Laws State Level California Privacy policy for apps; Notices to online users; Do-not-track disclosure; Access to data disclosures; Erasure requirements Pending ballot initiative: California Consumer Privacy Act enhanced disclosure and limits on commercial use of personal data (similar to GDPR) New York Pending: SHIELD Act: Strengthened breach notification and requirements to implement security safeguards; also includes safe harbors Key takeaway: Patchwork of state laws and constant change = Increased compliance costs ($$)

E.U. / U.S. Comparison Obligations E.U. U.S. Privacy by Design Yes Limited Privacy Notices Yes Limited Affirmative Consent Yes Limited Data Breach Notice Yes Yes, but looser Data Protection Officer Yes No Data Access Rights Yes Very limited

E.U. / U.S. Comparison Obligations (Cont d) E.U. U.S. Required Security Safeguards Data Transfer Restrictions Yes Yes Yes, for some sectors and states Limited Penalties Substantial More modest Enforcement Supervisory Authority; Individual actions Sector agencies and states; Individual actions vary by state

So, What To Do?

Compliance / Risk Management Evolving Contract Practices Arises in many contexts cloud computing contracts, vendor contracts, M&A reps and warranties, etc. More requests for cybersecurity assurances Flow downs to vendors and subcontractors Audit requirements SSAE 16 audits and SOC 1 and 2 reports A lot of liability shifting indemnity clauses, liability carve outs

Compliance / Risk Management Evolving Contract Practices Vendors being required to maintain reasonable security controls Contracts being updated to include cybersecurity requirements and indemnities Data breach insurance becoming more common

Compliance / Risk Management Administrative Safeguards Implement cybersecurity processes and practices that map to applicable law Train staff on cybersecurity awareness Consider need for chief privacy officer or committee Limit data access on a need-to-know basis Collect and retain data only so long as needed Properly dispose of data when no longer needed (shred, erase, destroy)

Compliance / Risk Management Administrative Safeguards Review and update privacy policies for web and mobile applications and adhere to them Prepare breach response plan (and team) in advance Maintain IT systems security policy Follow relevant industry best practices (such as PCI Data Security Standards for certain online payments)

Compliance / Risk Management Technical Safeguards Restrict data on, and password protect, mobile devices Use encryption for data at rest and in transit Implement strong password practices Use firewalls and data intrusion detection tools Conduct periodic system security assessments and audits (including for vendors)

Questions Comments Follow-up Brett Lockwood blockwood@sgrlaw.com 404-815-3674