Header graphic for print

Privacy Law Blog

European DPA’s Give Privacy Recommendations to Stakeholders Regarding the “Internet of Things”

Posted in Data Privacy Laws

The Article 29 Working Party, which is composed of representatives of DPA’s from every European country, has recently rendered an opinion (http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf ) on data privacy issues surrounding the development of the “Internet of Things” (IoT), which includes wearable computing, quantified self devices, and domotics. Although such data is generated by “things” or devices, it is considered personal data because it may enable the life pattern of a specific individual to be discerned. After identifying the major privacy issues raised by such devices, the Article 29 Working Party made a series of recommendations to IoT stakeholders. Continue Reading

Advertising Industry Enforces Enhanced Behavioral Advertising Notice Requirements on Websites

Posted in Behavioral Marketing

On October 28, the Online Interest-Based Advertising Accountability Program (Accountability Program), released five decisions in which the website operators  have agreed to update their respective websites to provide enhanced notice as required under the Self-Regulatory Principles for Online Behavioral Advertising (OBA Principles).  The Accountability Program enforces the OBA Principles on behalf of the Digital Advertising Alliance and these decisions stem from a compliance warning issued by the Accountability Program in October 2013.

The 2013 compliance warning explained the responsibility of website operators to (i) provide enhanced notice on every page where they permit third parties to collect information for interest-based advertising or when they themselves transfer such data to unrelated third parties, (ii) link that real-time notice to their explanation of their third party interest-based advertising practices (which disclosure must either link to an industry-developed consumer choice page or list every third party conducting OBA activity on the website) and (iii) signal their adherence to the OBA Principles. The recent decisions confirmed the responsibilities set forth in the compliance warning and further illustrated how compliant implementation of enhanced notice can be achieved. The decisions noted that enhanced notice links must appear on every page where a third party is collecting information for interest-based advertising, be separate from the link to the website’s privacy policy and should go directly to the place in the privacy policy where the disclosure is located (not just generally to the privacy policy) or to another location on the website where that explanation is provided.

These decisions serve as a reminder to website publishers that they cannot pass all responsibility for compliance with the OBA Principles on to advertisers and that they should periodically review their privacy disclosures for compliance with applicable industry guidelines.  As noted by Accountability Program Director Genie Barton, these cases are “only the beginning of [their] enforcement of website notice and choice.”

FCC Confirms Solicited Fax Ads Must Include an Opt-Out

Posted in Direct Marketing, TCPA

Last Thursday the Federal Communications Commission (FCC) issued an order confirming that companies must include opt-out instructions on all fax ads, even for recipients who previously agreed to receive a fax from the company. The order clarifies that solicited fax ads, like unsolicited ads, must also comply with the rules set forth in the FCC’s 2006 Junk Fax Prevention Order.  All fax ads must contain an opt-out notice that (1) is clear and conspicuous and on the first page of the ad, (2) states that the recipient may make a request to the sender not to send any future ads, and (3) contains a domestic phone and fax number so that the recipient has a contact for opt-out purposes. Continue Reading

FCC: The New Data Security Sheriff In Town

Posted in Cyber Security, Data Breaches, Data Privacy Laws, Security Breach Notification Laws

Data security seems to make headlines nearly every week, but last Friday, a new player entered the ring.  The Federal Communications Commission (“FCC”) took its first foray into the regulation of data security, an area that has been dominated by the Federal Trade Commission.  In its 3-2 vote, the FCC did not tread lightly – it assessed a $10 million fine on two telecommunications companies for failing to adequately safeguard customers’ personal information. 

Continue Reading

New Jersey bill to prohibit unsolicited text message advertisements pending Governor signature

Posted in Mobile Privacy, TCPA, Uncategorized

A New Jersey bill which prohibits unwanted text message advertisements has been sent to the Governor for final consideration.   A. 617, which passed unanimously in the Assembly June 26 and in the Senate Sept. 22, if signed into law, would make it illegal to send a text message advertisement to a New Jersey resident if it caused the recipient to incur a telecommunications charge or a usage allocation deduction. Sponsors of the bill noted an increasing number of complaints from consumers regarding unsolicited text messages advertising goods and services. The bill would also bar text message advertisements without prior express authorization from the recipient that includes the number to which the text message may be sent. The bill provides for an exception in the event an advertiser could demonstrate that the unsolicited text message advertisement was an isolated message sent no more than once in a 12-month period. In addition, the bill requires telecommunications companies that sell text messaging services to offer an option allowing customers to block all incoming and outgoing text messages. According to the sponsors’ statement, violations would be subject to a maximum penalty of $10,000 for a first offense and $20,000 for a subsequent offense.

The New Jersey bill is following closely behind a similar Connecticut law passed in early July. The Connecticut legislation amended the state’s existing telemarketing law to cover unsolicited marketing text and media messages as well as phone calls. The amended law prohibits, among other things, sending unsolicited marketing text messages and unsolicited marketing “media messages” without first obtaining prior express written consent (as defined by the FCC’s Rules for Telephone Consumer Protection Act). As revised, the Connecticut law provides for a maximum fine of $20,000 per unsolicited message and a violation of the law constitutes a violation of the Connecticut Unfair Trade Practices Act, which provides for a private right of action.

In addition, California, Rhode Island and Washington all have laws on the books that regulate the ability of companies to send text message advertisements.

On the Federal level, the Telephone Consumer Protection Act also requires prior express written consent when auto-dial technology is used to send promotional messages. Since the various laws applicable to text messages have different scopes of application and consent definitions, companies should continue to monitor text message requirements nationwide and ensure their marketing programs are in line with the law.

California Updates State Breach Notification Law, Expands Security Procedures to Entities that “Maintain” Personal Information

Posted in California, Data Breaches, Identity Theft, Security Breach Notification Laws

On September 30, 2014, California took further steps to protect the personal information of its residents by amending several sections of its breach notification and information security laws (Cal. Civ. Code §§ 1798.81.5, 1798.82 and 1798.85).  The amended law, which is effective January 1, 2015, updates existing law in three significant ways:

  1. Under current law, businesses that own or license personal information about a California resident must implement reasonable security procedures and practices appropriate to the nature of the information.  This requirement is expanded to also include entities that merely “maintain” such personal information. 
  2. Under current law, businesses that own or license personal information may be required to issue a security breach notification to affected individuals in the event of a breach where an individual’s social security number or driver’s license number may have been exposed.  The amended law provides that if the entity providing the notification was the source of the breach, an offer to provide identity theft prevention or mitigation services, if any, must be made at no cost to the affected person for at least 12 months, along with all information necessary to take advantage of the offer.  The breach notification requirement does not apply to entities that merely “maintain” personal information.  Given the words “if any,” and the ambiguity as to whether those words refer to the availability of credit monitoring services in the marketplace or to whether the business has chosen to offer it, it is not clear from the law whether this constitutes an absolute requirement to offer credit monitoring services to affected individuals.  That said, we note that the bill’s co-author, Assemblyman Roger Dickinson, stated his view in a recent interview with Law360 that the offer to provide credit monitoring services is mandatory when a driver’s license number or social security number was breached.
  3. Under current law, a business may not publicly disclose an individual’s social security number or engage in other acts that might compromise its security.  The amended law clarifies that except as permitted by law, a person or entity may not sell, advertise for sale, or offer to sell an individual’s social security number.

For purposes of #1 above, the amended law defines the term “maintain” to include personal information that a business maintains but does not own or license.  This appears to include entities that host or otherwise retain data for others, such as “cloud” storage companies and businesses that collect information but do not own or license it.  These entities will need to implement and maintain reasonable security procedures and practices to the extent that the data it collects contains personal information.  That said, the law provides that such security procedures and practices are scalable; they should be “appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure.”

Fiduciary Access to Digital Assets and Accounts

Posted in Cloud Computing, Electronic Communications, Legislation, Online Privacy

Traditionally, a person’s most valuable assets to be distributed upon death consisted of tangible items such as real property, cash, jewelry and personal effects of sentimental value like photographs and letters.  However, the advent of the digital age has brought a shift from file cabinets, mailmen and photo albums to cloud storage, e-mail accounts and online photo streams.  Today, virtually everyone has at least some assets that are not physical, but are stored as data and accessed via the Internet.  “Digital assets” may include, for example, text messages, instant messaging accounts, e-mails, documents, audio or video images and sounds, social media content, health insurance records, source code, software, databases, online bank accounts, blogs, and the user names and passwords necessary to access online accounts, among other things.  More specifically, consider a person’s PayPal or Venmo accounts, which might contain large sums of money, or Google, Yahoo, Facebook or Instagram accounts, which might contain letters, pictures, videos and other items of intrinsic value.  The steady growth of most individuals’ online presence has given rise to a novel legal issue – authority over administering the digital assets and accounts of an account holder upon death or disability.  Continue Reading

Toward the enforceability of the “right to be forgotten” in Europe

Posted in Data Privacy Laws, European Union

The European Court of Justice, in a decision rendered on May 13, 2014, held that search engines are considered data controllers under the Directive of October 24, 1995 on data protection, and as such they must provide data subjects with a “right to be forgotten.” Continue Reading

California Breaks New Ground in Education Privacy Law with K-12 Student Data Privacy Bill

Posted in California, Children's Online Privacy Protection Act, Cloud Computing, Data Privacy Laws

A substantial rise in schools’ use of online educational technology products has caused educators to become increasingly reliant on these products to develop their curricula, deliver materials to students in real time, and monitor students’ progress and learning habits through the collection of data by third-party cloud computing service providers.  Unfortunately, with these advances come the data security concerns that go hand-in-hand with cloud computing—such as data breaches, hacking, spyware, and the potential misappropriation or misuse of sensitive personal information.  With the Family Educational Rights and Privacy Act (FERPA)—federal legislation enacted to safeguard the privacy of student data—in place for four decades, the education sector is ripe for new standards and guidance on how to protect students’ personal information in the era of cloud computing. California has tackled this issue head on, with the passage of two education data privacy bills by its legislature on August 30, 2014.  Senate Bill 1177 and Assembly Bill 1442 (together, the Student Online Personal Information Protection Act (SOPIPA)) create privacy standards for K-12 school districts that rely on third-parties to collect and analyze students’ data, and require that student data managed by outside companies remain the property of those school districts and remain within school district control. Continue Reading

Major Barrier to E-Commerce in Middle East and North Africa is Fear about Data Security

Posted in Articles, E-Commerce

In a recent article published by Law 360, Proskauer litigation associate Courtney Bowman outlines how companies can make inroads in the e-commerce market in the Middle East and North Africa (MENA).  Although often overlooked, the region’s relative wealth and level of internet penetration make its more stable areas attractive markets for those companies willing to undertake the steps necessary to understand the region’s cultural nuances and customer preferences.  Two of the most significant barriers to e-commerce growth in MENA is the widespread reluctance of customers to shop online due to fears about the security of online transactions, as well as the low rate of credit card use in the region.  As the article notes, however, e-commerce companies willing to offer solutions tailored to address these concerns, such as cash cards and m-payment systems, may be poised to establish a potentially lucrative presence in this part of the world.

Is the Flap Over Microsoft Emails in Ireland Overblown?

Posted in Articles, Electronic Communications

Corporate Counsel published an article authored by Nolan Goldberg, Senior Counsel, Intellectual Property and Technology, concerning the recent decision compelling Microsoft to produce e-mails located on foreign servers. The article, entitled “Is the Flap Over Microsoft Emails in Ireland Overblown?”, provides a counter-point to critics who believe that Judge Preska’s Order will have broad implications for the U.S. technology industry.

Capital One to Pay Largest TCPA Settlement on Record

Posted in TCPA

Capital One Financial Corp. (“Capital One”) and three collection agencies have agreed to pay one of the largest settlement amounts in history — $75.5 million — to end a consolidated class action lawsuit alleging that the companies used an automated dialer to call customers’ cellphones without consent in violation of the twenty-two-year-old Telephone Consumer Protection Act (“TCPA”). Judge Holderman of the Northern District of Illinois preliminarily approved the settlement in late July.  Continue Reading