Ch. 3: Federal and State Regulators and Enforcement of Privacy Laws Flashcards

1
Q

FTC Background

A

1) Independent agency governed by 5 commissioners (with one being the Chair).
2) Has authority to enforce against “unfair and deceptive trade practices.”
3) SPECIFIC authority to enforce COPPA, and CAN-SPAM.
4) Prominent role in development of U.S. privacy standards.

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Federal privacy areas covered by federal agencies.

A

Medical - HHS Office of Civil Rights

Financial - CFPB generally; Federal Reserve and Comptroller of Currency for institutions under their jurisdiction pursuant to GLBA.

Education - ED

Telemarketing and marketing privacy - FCC (with FTC) under TCPA and other statutes.

Workplace privacy - EEOC and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State Dept role in privacy

A

Negotiating internationally on privacy issues with other countries and multinational groups like OECD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

US Dept of Commerce

A

Leading role in policy development and administered Privacy Shield Framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

US Dept of Transportation

A

Enforced privacy shield violations between US and EU for some transportation companies.

FAA, on drone policy.

National Highway Traffic Safety Administration, on connected cars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OMB

A

Interpreting Privacy Act of 1974.

Also issues guidance to agencies and contractors on privacy information security issues, such as data breach disclosure and privacy impact assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IRS

A

Subject to privacy rules re. tax records.

Other Dept of Treasury parts involved with financial records issues, including compliance with money laundering rules at the Financial rimes Enforcement Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

US Dept of Homeland Security

A

E-verify program for new employees, rules for air traveler records (TSA), and immigration and other border issues (ICE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dept of Justice

A

DOJ is sole federal agency to bring criminal enforcement actions, which can result in imprisonment or criminal fines. Some statutes provide for civil and criminal, so DOJ works with other enforcement agency (eg HHS for HIPAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTC Jurisdiction - Section 5 of FTCA

A
  • Section 5 of the FTC Act is perhaps the single most important piece of U.S. privacy law. Section 5 notably says that “unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful,” although it does not mention privacy or information security.
  • During the 1990s, the FTC began bringing privacy enforcement cases under its powers to address unfair and deceptive practices.
  • Congress added privacy-related responsibilities to the FTC over time, such as those under the Children’s Online Privacy Protection Act (COPPA) of 1998 and the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003.
  • Among other authoritative powers, Section 6 of the FTC Act vests the commission with the authority to conduct investigations and to require businesses to submit investigatory reports under oath.
  • FTCA Section 5 not apply to nonprofits, banks and common carriers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FTC Jurisdiction - specific laws

A
  • FTCA Section 5 - Enforcement, but rulemaking is only in theory under burdensome Magnuson-Moss Act of 1975.
  • Rulemaking and enforcement for COPPA.
  • Rulemaking and enforcement for CAN-SPAM (shared with FCC).
  • Rulemaking and enforcement for Telemarketing Sales Rule (shared with FCC).
  • Enforcement shared with CFPB for financial institutions not covered by other regulator (like Fed or Comptroller) WRT GLBA , FCRA (and FACTA). No rulemaking authority.
  • Rulemaking and enforcment authority shared with HHS for data breaches related to medical records under HITECH Act of 2009.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FTC Consent Decrees

A
  • Defendant not admit fault, but promises to change its practices and avoid further litigation on the issue. States what must do or must not do, and requires maintain proof of compliance, maintain privacy program, subject to audits, inform relevant persons of the CD.
  • Posted publicly.Provide guidance re. what practices FTC considers inappropriate.
  • Any violation of the CD can lead to enforcement in federal district court, including civil penalties, injunction and other relief.
  • CDs monitored by Enforcement Division within the Bureau of Consumer Protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTC Enforcement Process

A
  • Broad investigatory powers.
  • FTC issues complaint, and leads to administrative trial before ALJ.
  • If violation found, ALJ can enjoin (appeal to comissioners, and then to district court).
  • order of commission is final within 60 days after serve on company.
  • FTC lacks civil fine authority, but if FTC ruling ignored, can seek civil penalties in federal court up to $40,654 per violation and seek compensation for those harmed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Privacy notices required?

A
  • Although there is no omnibus federal law requiring companies to have public privacy notices, certain sector-specific statutes such as HIPAA, Gramm-Leach-Bliley, and COPPA do impose notice requirements.
  • Also, California requires companies and organizations doing in-state business to post privacy policies on their websites.
  • By 2000, the vast majority of commercial websites posted privacy notices even in the absence of a legal requirement.
  • By then, privacy notices had become a standard feature of legitimate commercial websites.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deceptive practice standard?

A
  • For a practice to be deceptive, it must involve a material statement or omission that is likely to mislead consumers who are acting reasonably under the circumstances.
  • Deceptive practices include false promises, misrepresentations, and failures to comply with representations made to consumers,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unfair claims under FTCA, re. privacy

A
  • By 2004, the FTC began to enforce “unfair” practices as well.

Unfair claims can exist even where the company has not made any deceptive statements if the injury is substantial, lacks offsetting benefits, and cannot be easily avoided by consumers.

Wyndham standard: Unfair “when it publishes a privacy policy to attract customers who are concerned about data privacy, fails to make good on that promise by investing inadequate resources in cybersecurity, exposes its unsuspecting customers to substantial financial injury, and retains the profits for their business.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2012 White House Consumer Privacy Bill of Rights

A
  • based on traditional FIPs.
  • Individual control, on collection and use
  • Transparency, of privacy and security practices.
  • Respect for context, ie process in ways consistent with context in which data provided by consumer.
  • Security
  • Access and accuracy,
  • Focused collection - ie reasonable limits on collection and retention.
  • Accountability -

Also emphasized international interoperability, and FTC enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2012 FTC Report

A
  • Many of same themes as White House Consumer Privacy Bill of Rights
  • Privacy by Design
  • Simplified consumer choice - not for uses consistent with collection context, but for other uses.
  • Transparency - clearer, shorter privacy notices.
  • Do not track mechanism.
  • Mobile - greater self-regulation
  • Data brokers - support legislation giving access to info held by DBs.
  • Large platform providers - examine issues of those doing “comprehensive tacking”.
  • self-regulatory codes - promoted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2015 FTC Privacy and Data Security Update

A

Reasonable data security practices should include at least 5 principles:

(1) companies should be aware of what consumer information they have and who has legitimate access to this data;
(2) companies should limit the information they collect and maintain for their legitimate business purposes;
(3) companies should protect the information they maintain by assessing risk and by implementing procedures for electronic security, physical security, employee training and vendor management;
(4) companies should properly dispose of information they no longer need; and
(5) companies should have a plan in place to respond to security incidents, in case they occur.

2015 unfairness trend: FTC bringing enforcement when company unreasonably and unnecessarily exposed consumers personal data to unauthorized access. After hack or malware attack, FTC investigates to determine if they had taken reasonable steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2016 FTC Privacy and Data Security Update

A
  • Focused on smartTVs, drones and ransomeware.
  • letters of warning re. TV beacons collected by phones to target adds.
  • InMobi - fine $1M re. deceptively tracking location even when consumer opted out.
  • Turn, Inc. settled allegations it continued to track even after consumer deleted cookies and reset identifiers on phone.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State privacy enforcement

A
  • Each state has a law similar to Section 5 of FTCA (UDAP statutes).
  • In addition to unfair and deceptive, some state laws allow enforcement against “unconscionable” practices.
  • Some federal laws, like CAN-SPAM, allow state AGs to bring enforcement actions along with relevant federal agency.
  • Several states allow PROA under UDAP.
  • State enforcement of data breach notificatoin laws, and related security lapses.
  • sector speciic - medical, financial, and workplace. Smart grid and state utilities.
  • Privacy torts.contract enforcement in some cases as well, when breach of a promise.
  • National Association of Attorneys General Consumer Protection Project.
  • California leading way. Eg, mobile app privacy permissions, data breach notice actions, inadequate privacy notice actions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Self regulation and enforcement

A

3 components:

  1. Legislation - Who should define the privacy rules.
  2. Enforcement - Who should initiate actions.
  3. Adjudication - Who should decide whether violation ocurred.

Sometimes is hybrid, or co-regulation, where company or industry does legislation, and govt. agency (FTC or state AG, eg) investigates and ALJ and courts adjudicate.

PCI-DSS is completely self-regulatory.

Certification programs, if explicitly allowed for in statute (like COPPA) can serve as way to comply with legal requirements. is form of co-reg.

  • Digital Advertising Alliance, coalition of media and advertising organizations, is self-reg.

Obama Admin, and 2012 efforts, endorsed self-reg. with all stakeholders involved, including consumer groups. so is multi-stakeholder approach.

  • NTIA issued report mid2010s on drones and privacy after multi-stakeholder effort.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cross-border enforcement

A
  • OECD in 2007 called for member countries to work together to promote cross-border enforcement cooperation.
  • Led to GPEN- Global Privacy Enforcement Network in 2010. Aim is to promote cross-border info sharing and investigative/enforcement cooperation around the world.
  • Also, there is APEC’s Cross Border Privacy Enforcement Arrangement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Conflicts Between Privacy and Disclosure Laws

A

Arise when privacy laws in Country X prohibit disclosure but laws in Country Y compel disclosure.

  • Example - US court requires litigant to disclose X document in course of litigation, but its subject to GDPR which prohibits disclosure.
  • More details on Ch 4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Civil Litigation?

A

Occurs in courts when one person sues another person to redress a wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What types of relief may a person seek in civil litigation?

A
  1. Monetary Judgment

2. Injunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When may person sue based on a violation of law?

A

When a law creates a private right of action (ex. FCRA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Criminal Litigation?

A

Lawsuits brought by the government for violations of criminal laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What types of punishment are typical associated with Criminal Litigation?

A
  1. Imprisonment

2. Criminal Fines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Who initiates Criminal Litigation?

A
  1. DOJ

2. State attorney generals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are Agency Enforcement Actions?

A

Actions carried out pursuant to the statues that create and empower an agency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the Administrative Procedure Act?

A

An act laying out the basic rules for agency enforcement actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What Act and Agency(ies) govern Medical Privacy?

A

Agencies - OCR and CMS (both roll up to HHS)

Act - HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What Act and Agency(ies) govern Financial Privacy?

A

Agencies - CFPB, OCC, FED

Act - GLBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What Act and Agency(ies) govern Education Privacy?

A

Agencies - Dept. of Education

Act - Family Educational Rights and Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What Act and Agency(ies) govern Telemarking and Marketing Privacy?

A

Agencies - FCC and FTC

Act - Telephone Consumer Protection Act and other statues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What Act and Agency(ies) govern Workplace Privacy?

A

Agencies - EEOC and other agencies

Act - ADA other statutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which Acts give the FTC power to govern privacy issues?

A
  1. FTC Act Section 5
  2. FCRA
  3. Children’s Online Privacy Protection Act (COPPA)
  4. Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)
  5. Telemarking Sales Rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What incentives do a company and the FTC have to negotiate a consent decree rather than proceed with full adjudication?

A

FTC

  1. Achieves a consent decree that incorporates good privacy and security practices
  2. Avoids the expense and delay of trail
  3. Gains an enforcement advantage due to the fact the fines are easier to assess in federal court if a company violates a consent decree

Company

  1. Avoids a prolonged trial
  2. Avoids negative publicity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is considered “unfair”?

A

An injury that is:

  1. Substantial
  2. Without offsetting benefits
  3. one the consumers cannot reasonably avoid.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Unfair Case: Gateway

A

Facts: Privacy policy stated Gateway would not sell, rent, or loan PI without explicit consent. If the practice changed Gateway stated they would provide customers an opportunity to opt-out. Gateway started renting PI to third parties without providing the opt-out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Unfair Case: BJ’s Wholesale Club

A

Facts: BJ failed to encrypt PI and secure its wireless networks to prevent unauthorized access. Hundreds of customers’ identities were stolen. Established that failing to implement basic security controls to protect PI is an unfair trade practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Unfair Case: Google

A

Google buzz automatically enrolled consumers and provided personal information to the public. This was in conflict with Google’s privacy notice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Unfair Case: Facebook

A

Facts: Facebook repeatedly made designated personal private information public. This was in violation of Facebook’s privacy notice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the Consumer Privacy Bill of Rights?

A
  1. Individual Control
  2. Transparency
  3. Respect for Context
  4. Security
  5. Access and Accuracy
  6. Focused Collection
  7. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What areas did the FTC Report emphasize?

A
  1. Privacy by Design
  2. Simplified Consumer Choice
  3. Transparency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What five priorities did the FTC announce for attention?

A
  1. Do Not Track
  2. Mobile
  3. Data Brokers
  4. Large Platform Providers
  5. Promoting enforceable self-regulatory codes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How to states enforce against unfair and deceptive practices?

A

Most states have laws similar to Section 5 of the FTC Act. These laws are commonly known as UDAP statutes. Ina addition to covering unfair and deceptive practices, some states allow enforcement against unconscionable practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Who enforces UDAP laws?

A

State attorney generals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How does self regulation occur?

A

Through three traditional separation of powers components: (1) legislation, (2) enforcement, and (3) adjudication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does legislation refer to?

A

To the question of who should define the appropriate rules for protecting privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What does enforcement refer to?

A

To the question of who should initiate enforcement actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does adjudication refer to?

A

To the question of who should decide whether a company has violated the privacy rules, and with what penalties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Where does self regulation occur with Section 5 of the FTC and state UDAP laws?

A

At the legislation stage - companies write their privacy policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is PCI DSS?

A

Payment Card Institute Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Where does self regulation occur with PCI DSS?

A

At all three stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is GPEN?

A

Global Privacy Enforcement Network. it aims to promote cross-border information sharing as well as investigation and enforcement cooperation among privacy authorities around the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is APEC?

A

Asia-Pacific Economic Cooperation. The Asia-PAcific Cross-Border Privacy Enforcement Arrangement (CPEA) aims to establish a framework for participating member to share information and evidence in cross-border investigations and enforcement actions in the Asia-Pacific region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cable Communications Privacy Act of 1984

A

CCPA- regulates required notice of cable TV providers, once at start of service and annually thereafter.

You can request opt-out, but exceptions are:

  • legit business activities
  • court order
  • Name and address only

FCC, FTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Communications Assistance to Law Enforcement Act of 1994

A

CALEA, Digital Telephony Bill.
- requires communications companies to design products to allow for lawful government access (wiretaps, etc)

As of 2005, includes internet.

FCC, FTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

CAN-SPAM Consent to Share Requirements

A

“Express Prior Authorization”- must be an affirmative OK, like a checkbox or button. It can be written, oral, or digital, must there must be a record of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

CAN-SPAM email requirements

A
  • No false or misleading headers
  • clear, working return email address
  • clear opt-out without cost
  • don’t send to those who have unsubscribed (10 day grace period)
  • no aggravated actions, like address harvesting
  • pornographic content must have a warning label

Now covers texts, too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Cybersecurity Information Sharing Act of 2015

A

CISA- federal government can share unclassified, technical data with companies about attacks/breaches, as well as how to defend against them.

No consent needed. PI must be removed.

DHS, DOJ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Electronic Communications Privacy Act of 1986

A

Collective name of ECPA and Stored Wire Electronic Communications Act, which updates the Federal Wiretap Act.

Protects communications when made, in transit, and stored on computers.

Only one party (provider exception) needs to consent to share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Comprehensive Alcohol Abuse and Alcoholism Prevention, Treatment, and Rehab Act of 1970

A

Must have written patient consent to share these types of medical records. Covers any program receiving federal funding.

Exceptions:

  • medical emergency
  • research
  • audits, evaluations
  • crimes on premises
  • child abuse
  • court order
  • for the organization to provide services

Often in parallel with HIPAA.

AG.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

FERPA vs. HIPAA

A

HIPAA doesn’t cover a school if FERPA covers them. This is generally a public-funded school with a nurse on staff.

FERPA does NOT apply to private schools, so HIPAA would cover them.

College health centers treating only students = FERPA
College health centers treating students and staff = FERPA for students, HIPAA for staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

5th Amendment

A

No self-incrimination, which is often interpreted to mean you have a right to privacy in some situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

GINA- what agencies enforce it?

A

EEOC - Title II (employment discrimination)

DOL, HHS, Treasury- title I (genetic info in health insurance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Junk Fax Prevention Act

A

Created the EBR exception in TCPA. Faxes must have a clear opt out.

FTC, FCC, TCPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

21st Century Cures Act of 2016

A

It’s OK to give researchers health data to “expedite research.”
Provisions:
- OK to view data remotely in compliance with HIPAA
- must have certs of confidentiality
- can’t block pharma’s access to the data
- no personal info

FDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

PATRIOT ACT, Section 215

A

“Library Records” provision and “Tangible Things” provision: allows FBI director to apply for an order to produce materials that assist in investigations against terrorism.
- things like books, papers, records

Only FISA and magistrate judges can grant it. Does NOT need to say why it was granted!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

USA FREEDOM Act of 2015

A

Modified Patriot Act:

  • outs some restriction on bulk collection, following Snowden
  • restored roving wiretaps for terrorist tracking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Privacy Protection Act of 1980

A

PPA- gives the media extra protection from government searches in criminal investigations.

Based on 1978 case Zurcher v Standford Daily, where police used a warrant to look through unpublished photos of a demonstration to find a suspect. SC said this was OK as long as there was strong case that evidence would be found. Still requires warrant or subpoena

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Binging Corporate Rules (BCRs)

A

Internal rules for data transfers within multinational companies, like a code of conduct for transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Standard Contract Clauses (SCCs)

A

Established by EU to cover data transfer outside of EU:

  • 2 for controller to controller
  • 1 for controller to processor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

4 Types of Privacy

A

Info (PII, etc)
Communications (mail, phone, email)
Bodily (drug testing, health testing, search, etc)
Territorial (home, work, monitoring, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Data Controller vs. Processor

A

Per GDPR:

  • Controller: determines the purpose and means for processing PI
  • Processor: processes data on behalf of controller.

Under GDPR, the controller must make sure the processor takes appropriate security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Is an IP personal data?

A

In the EU, yes. In the US, under the Privacy Act, no, but the FTC considers it PI if breached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Info Management: Discover, Build, Communicate, Evolve

A

Discover: ID the issue, self assess, and determine best practice

Build: Make procedures, verify, and implement

Communicate: document and educate

Evolve: affirm, monitor, and adapt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What laws DO NOT preempt stricter state law?

A
GLBA
TSR / TCPA
VPPA (except CA)
ECPA (except in DE and CT)
PPA
RFPA
HIPAA
SAMHSA
81
Q

What laws allow for Private Right of Action?

A
CCPA
VPPA
FCRA
ECPA
CA SB 1386
82
Q

What laws do NOT allow for private right of action?

A

GLBA
COPPA
CAN-SPAM
GINA

83
Q

What are the rules in FACTA?

A

The disposal rule and the red flag rule

84
Q

what are the rules in GLBA?

A

Safeguard rule; Privacy rule

85
Q

What rules are in HIPAA?

A

Privacy rule; Security rule; Omnibus rule

86
Q

What regulatory body created TSR?

A

FTC

87
Q

What rule is part of TCPA

A

TSR

88
Q

What act created DoNotCall Registry

A

TCPA

89
Q

What act was amended to include SCA?

A

ECPA

90
Q

What two acts have a privacy rule?

A

HIPPA and GLBA

91
Q

What act(s) require opt-in to share information?

A

FCRA; COPPA; HIPAA

92
Q

What act(s) require privacy notices?

A

GLBA; COPPA; HIPAA

93
Q

What act(s) allow for opt-out of sharing?

A

GLBA; CAN-SPAM; JFPA

94
Q

What act(s) have strong preemption?

A

FACTA; FERPA; CAN-SPAM

95
Q

What act(s) have some preemption?

A

COPPA; TCPA (Interstate regulations)

96
Q

What act(s) have Private right of action?

A

FCRA; RFPA; TCPA;VPPA; JFPA; CCPA;

97
Q

What act(s) require training?

A

HIPPA

98
Q

what are legally complaint method for transporting at out of the US?

A

Binding Corporate Rules (BCC); Standard Contractual Clauses (SCC); Privacy Shield; Codes of Conduct; Certification Mechanisms;

99
Q

4th Amendment principles have informed a number of statutes such as:

A
  1. Wiretap laws,
  2. the Electronic Communications Privacy Act,
  3. the Right to Financial Privacy Act (applying to financial institutions), and
  4. the Privacy Protection Act (applying to reporters and media companies)”
100
Q

Which US laws require disclosure of personal information held by an organization?

A
  1. Food, Drug and Cosmetic Act (FDA)
  2. OSHA
  3. HIPAA
101
Q

According to FRCP 45 a subpoena must:

A
  1. State the court from which it is issued
  2. State the title of the action and its civil-action number
  3. Command each person to whom it is directed to do the following at a specific time and place: attend and testify; produce designated documents, electronically stored information or tangible things in that person’s possession, custody or control; or permit the inspection of premises
  4. Set out the text of the rules describing a person’s right to challenge or modify the subpoena.
102
Q

How many bureaus at FTC?

A

Three bureaus do the work of the FTC: Competition, Consumer Protection, and Economics. Several other offices help implement the mission of the bureaus.

103
Q

Lisa the three bureaus do the work of the FTC

A

1) Competition
2) Consumer Protection
3) Economics.

Several other offices help implement the mission of the bureaus.

104
Q

Wireless telecommunication services means services providing for the transmission of wireless communications utilizing frequencies authorized ________ _______ ________ ________for paging systems, enhanced specialized wireless telecommunication, television, personal communication services or cellular telephone.

A

by the Federal Communications Commission

105
Q

What is Civil Litigation?

A

Occurs in courts when one person sues another person to redress a wrong.

106
Q

What types of relief may a person seek in civil litigation?

A
  1. Monetary Judgment

2. Injunction

107
Q

When may person sue based on a violation of law?

A

When a law creates a private right of action (ex. FCRA)

108
Q

What is Criminal Litigation?

A

Lawsuits brought by the government for violations of criminal laws.

109
Q

What types of punishment are typical associated with Criminal Litigation?

A
  1. Imprisonment

2. Criminal Fines

110
Q

Who initiates Criminal Litigation?

A
  1. DOJ

2. State attorney generals

111
Q

What are Agency Enforcement Actions?

A

Actions carried out pursuant to the statues that create and empower an agency.

112
Q

What is the Administrative Procedure Act?

A

An act laying out the basic rules for agency enforcement actions.

113
Q

What Act and Agency(ies) govern Medical Privacy?

A

Agencies - OCR and CMS (both roll up to HHS)

Act - HIPAA

114
Q

What Act and Agency(ies) govern Financial Privacy?

A

Agencies - CFPB, OCC, FED

Act - GLBA

115
Q

What Act and Agency(ies) govern Education Privacy?

A

Agencies - Dept. of Education

Act - Family Educational Rights and Privacy Act

116
Q

What Act and Agency(ies) govern Telemarking and Marketing Privacy?

A

Agencies - FCC and FTC

Act - Telephone Consumer Protection Act and other statues

117
Q

What Act and Agency(ies) govern Workplace Privacy?

A

Agencies - EEOC and other agencies

Act - ADA other statutes

118
Q

Which Acts give the FTC power to govern privacy issues?

A
  1. FTC Act Section 5
  2. FCRA
  3. Children’s Online Privacy Protection Act (COPPA)
  4. Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)
  5. Telemarking Sales Rule
119
Q

What incentives do a company and the FTC have to negotiate a consent decree rather than proceed with full adjudication?

A

FTC

  1. Achieves a consent decree that incorporates good privacy and security practices
  2. Avoids the expense and delay of trail
  3. Gains an enforcement advantage due to the fact the fines are easier to assess in federal court if a company violates a consent decree

Company

  1. Avoids a prolonged trial
  2. Avoids negative publicity
120
Q

What is considered “unfair”?

A

An injury that is:

  1. Substantial
  2. Without offsetting benefits
  3. one the consumers cannot reasonably avoid.
121
Q

Unfair Case: Gateway

A

Facts: Privacy policy stated Gateway would not sell, rent, or loan PI without explicit consent. If the practice changed Gateway stated they would provide customers an opportunity to opt-out. Gateway started renting PI to third parties without providing the opt-out.

122
Q

Unfair Case: BJ’s Wholesale Club

A

Facts: BJ failed to encrypt PI and secure its wireless networks to prevent unauthorized access. Hundreds of customers’ identities were stolen. Established that failing to implement basic security controls to protect PI is an unfair trade practice.

123
Q

Unfair Case: Google

A

Google buzz automatically enrolled consumers and provided personal information to the public. This was in conflict with Google’s privacy notice.

124
Q

Unfair Case: Facebook

A

Facts: Facebook repeatedly made designated personal private information public. This was in violation of Facebook’s privacy notice.

125
Q

What are the Consumer Privacy Bill of Rights?

A
  1. Individual Control
  2. Transparency
  3. Respect for Context
  4. Security
  5. Access and Accuracy
  6. Focused Collection
  7. Accountability
126
Q

What areas did the FTC Report emphasize?

A
  1. Privacy by Design
  2. Simplified Consumer Choice
  3. Transparency
127
Q

What five priorities did the FTC announce for attention?

A
  1. Do Not Track
  2. Mobile
  3. Data Brokers
  4. Large Platform Providers
  5. Promoting enforceable self-regulatory codes
128
Q

How to states enforce against unfair and deceptive practices?

A

Most states have laws similar to Section 5 of the FTC Act. These laws are commonly known as UDAP statutes. Ina addition to covering unfair and deceptive practices, some states allow enforcement against unconscionable practices.

129
Q

Who enforces UDAP laws?

A

State attorney generals

130
Q

How does self regulation occur?

A

Through three traditional separation of powers components: (1) legislation, (2) enforcement, and (3) adjudication

131
Q

What does legislation refer to?

A

To the question of who should define the appropriate rules for protecting privacy.

132
Q

What does enforcement refer to?

A

To the question of who should initiate enforcement actions.

133
Q

What does adjudication refer to?

A

To the question of who should decide whether a company has violated the privacy rules, and with what penalties.

134
Q

Where does self regulation occur with Section 5 of the FTC and state UDAP laws?

A

At the legislation stage - companies write their privacy policies.

135
Q

What is PCI DSS?

A

Payment Card Institute Data Security Standard

136
Q

Where does self regulation occur with PCI DSS?

A

At all three stages.

137
Q

What is GPEN?

A

Global Privacy Enforcement Network. it aims to promote cross-border information sharing as well as investigation and enforcement cooperation among privacy authorities around the world.

138
Q

What is APEC?

A

Asia-Pacific Economic Cooperation. The Asia-PAcific Cross-Border Privacy Enforcement Arrangement (CPEA) aims to establish a framework for participating member to share information and evidence in cross-border investigations and enforcement actions in the Asia-Pacific region.

139
Q

Which agency promotes job creation and economic growth by ensuring fair trade, providing the data necessary to support commerce and constitutional democracy, and fostering innovation by setting standards and conducting foundational research and development?

A

The Department of Commerce

140
Q

the federal agency for granting U.S. patents and registering trademarks

A

The United States Patent and Trademark Office (USPTO)

141
Q

Agency that regulates interstate and international communications by radio, television, wire, satellite, and cable in all 50 states, the District of Columbia and U.S. territories is

A

The Federal Communications Commission

142
Q

The operating units of the Department of Commerce are:

A

organizational entities outside the Office of the Secretary charged with carrying out specified substantive functions (i.e., programs) of the Department.

143
Q

The Bureau of Industry and Security is

A

an agency of the United States Department of Commerce that deals with issues involving national security and high technology. A principal goal for the bureau is helping stop the proliferation of weapons of mass destruction, while furthering the growth of United States exports.

144
Q

The Economics and Statistics Administration is an agency within

A

the United States Department of Commerce that analyzes, disseminates, and reports on national economic and demographic data. Its three primary missions are the following: Release and disseminate U.S. National Economic Indicators.

145
Q

The U.S. Economic Development Administration is an agency in

A

the United States Department of Commerce that provides grants and technical assistance to economically distressed communities

146
Q

The Bureau of Consumer Protection stops unfair, deceptive and fraudulent business practices by collecting reports from consumers and conducting investigations, suing companies and people that break the law, developing rules to maintain a fair marketplace, and educating consumers and businesses about their rights and is a part of what agency?

A

FTC

147
Q

The Federal Trade Commission Act

A

Codified in 15 USC section 45. Section 5(a) of the FTC act empowers the agency to enforce against - “unfair or deceptive acts or practices in or affecting commerce” are hereby declared unlawful.

148
Q

Limits on FTC Authority

A
  1. Applies to commerce, excluding nonprofits

2. Excludes financial institutions

149
Q

FTC Privacy & Enforcement Actions

A

The FTC brings enforcement actions under Section 5 of the FTC Act, which prohibits unfair and deceptive trade practices which holds businesses to fair and transparent privacy and security standards.

150
Q

Two outcomes of FTC enforcement actions

A
  1. Information Resolutions

2. Consent Decree

151
Q

Consent Decree

A

Formal contract between the government requiring modification of business practices

152
Q

Information Resolution

A

Agreement that the accused company will modify business practices without a formal enforcement action

153
Q

Privacy Enforcement Actions

A
  1. No broad privacy law in the US
  2. Corporate privacy policies often provide the basis for FTC enforcement actions
  3. Authority derived from FTCs power to regulate deceptive trade practices
  4. First action occurred in 1999, FTC files an enforcement action against GeoCities. Case settled with a consent degree requiring a privacy policy and new privacy controls.
  5. In 2014 – Trustee promised that they would conduct annual reviews of website they would certify but did not do that. Consent decree required a $200k fine and to follow-through on policy.
154
Q

FTC Security Enforcement Actions

A
  1. Authority to regulate unfair business practices
  2. May arise after a security breach
  3. May occur on a proactive basis
  4. Windham – credit card information.
155
Q

FTC Sunset Policy

A

Sets a 20-year maximum length on consent agreements

156
Q

The FTC protects ______ by stopping unfair, deceptive or fraudulent practices in the marketplace.

A

consumers

157
Q

What was the first FTC Internet privacy enforcement action?

A

In the Matter of GeoCities, Inc.

158
Q

What are the facts of the GeoCities case?

A

GeoCities operated a website that provided an online community through which users could maintain personal home pages. To register and become a member of GeoCities, users were required to fill out an online form that requested PI, with which GeoCities created an extensive info database. GeoCities promised on its website that the collected information would not be sold or distributed without user consent.

159
Q

What was the basis of the GeoCities action brought by the FTC?

A

Enforcement actions was for two separate unfair and deceptive practices. First, the FTC alleged that GeoCities misrepresented how it would use info collected from its users by reselling the information to third parties, which violated its privacy notice. Second GeoCities collected and maintain children’s PI without parental consent.

160
Q

What was the outcome of the GeoCities action?

A

GeoCities settled the action and the FTC issued a consent order, which required GeoCities to post and adhere to a conspicuous online privacy notice that disclosed to users how it would collect and use PI. It was also required to obtain parental or guardian consent before collective information from children 12 years of age or under.

161
Q

When did FTC bring an action against Eli Lilly & Co?

A

2004

162
Q

What are the facts of Eli Lilly & Co case?

A

Eli Lilly is a pharaceutical manufacturer that maintained a website where users would provide PI for messages and updates reminding them to take their medication. The website included a privacy notice that made promises about the security and privacy of the info provided. When Eli Lilly ended the program, it sent subscribers an e-mail announcement, inadvertently addressed to and revealing the e-mail addresses of all subscribers.

163
Q

What was the basis of the enforcement action against Eli Lilly by the FTC?

A

It reuslted in settlement terms, which required Eli Lilly to adhere to representations about how it collects, uses and protects user information. It also required, for the first time in an online privacy and security case, that Eli Lilly develop and maintain an information privacy and security program.

164
Q

Designerware

A

Tracking software on rent-to-own computers actually logged keystrokes, had webcam access, took screenshots, logged GPS. Used registration as way of getting personal info,

FTC issued consent decree.

165
Q

Geocities

A

Registration info notice said it wouldn’t sell or use data without consent, but they sold it to 3rd parties.

FTC issued consent decree, made them redo privacy notice.

166
Q

LabMD

A

Hacked in ‘09 and ‘12. PII and health ins. data leaked.

FTC brought action and LabMD opted for hearing, which was dismissed. FTC forced them to develop a sec program.

167
Q

LifeLock

A

They claimed to protect against ID theft totally, but it was really only certain forms of ID theft. Didn’t use encryption on PI or thoroughly restrict access.

Settled with FTC for $1M and fees, had to establish security program.

In 2015, action for failure to comply and fined $100M

168
Q

Nomi

A

Sensors in stores detect MAC addresses on phones. FTC claimed they misled about opt-out in notice and didn’t communicate which stores used the service. FTC issued consent decree.

169
Q

Snapchat

A

Snapchat was aware snaps could be saved, and address book details were collected from phones. Additionally, “Find Friends” wasn’t secure enough, got hacked, and users were spammed.

Consent decree with FTC

170
Q

TrustE

A

Issues digital certs for privacy, which they claimed to do yearly. FTC claimed 1k+ instances not recerted, but given a badge anyways.

FTC settlement

171
Q

Wyndham Hotels

A

3 hacks from 2008 - 2009. FTC said they stored CC info unencrypted, allowed easy passwords, didn’t use firewalls when they should have, had out of data systems, didn’t patch, no 3rd party access control, no unauthorized detection measures, and didn’t change any security protocols after breaches.

Wyndham took it to court and lost. 3rd circuit said FTC has the right to extend regulation to cyberspace if it’s causing harm to consumers.

172
Q

City of Ontario vs. Quon

A

4th Amendment. City reviewed pager texts and discovered sexual content. Court held that the search and seizure was OK because it was work-related, didn’t violate 4th Amendment.

173
Q

Aerospaciale vs. SD of Iowa

A

French company claimed you could only do discovery under the Hague Convention (one judicial state can request evidence from another) after victims of a plane crash in US were trying to get French info, and French company tried to issue protective order. Court said that convention was to facilitate info, so discovery didn’t need to precisely follow the Hague convention.

174
Q

Apple vs. FBI

A

FBI wanted back door to encrypted info on criminal’s iPhone. Apple said no. Case was dropped when 3rd party was able to crack it.

175
Q

Eli Lilly

A

Had a website that reminded users to take pills. When discontinued, they sent an email out but exposed al the email addresses in the “to” field. FTC brought enforcement action.

First time a privacy and sec program was required as part of settlement.

176
Q

Riley vs. California

A
  1. SC said you cannot search contents of a cellphone without getting a search warrant first.
177
Q

Katz vs. US

A

Katz used a apyphone to transmit illegal gambling bets. the FBI recorded it via wiretap, and Katz said this was a 4th amendment violation.

SC agreed, saying people have a right to “a reasonable amount of privacy”

178
Q

First FTC Internet privacy enforcement action?

A

In the Matter of GeoCities, Inc. (1999)
Company promised not to sell data without consent, but they did, and entered into CD with FTC. Company had to post conspicuous privacy notice.

179
Q

Eli Lilly case (2002)

A

Privacy notice made promises about security and privacy of user data provided to website. Company sent email to users revealing email addresses of all subscribers. CD with FTC , for first time, required company to develop and maintain an information security and privacy program.

  • So not just require company to refrain from unfair/deceptive practice, but was adding a proactive requirement.
180
Q

In the Matter of Nomi

A
  • Placed sensors in brick and mortar businesses to detect MAC address of mobile devices searching for wifi, and used data to analyze customer retail traffic patterns.

Misled consumers about opt-out ability, and did not inform consumers where this was taking place.

CD made them stop this.

181
Q

In the Matter of Snapchat

A

Deceptively led consumers to believe that snaps went away, when were many ways to keep.

Also, deceptively collected names and numbers of all contacts on user’s mobile device address book.

Also, did not secure find a friend feature.

Hackers compiled database using address book data.

CD had company agree not to continue doing these things.

182
Q

In Matter of TRUSTe, Inc.

A

Failed to conduct annual recerts in more than 1k instances, despite claim to conduct annual recerts (COPPA and Safe Harbor).

  • Comprehensive records required by CD and 200k civil penalty.
183
Q

In the Matter of Wyndham Worldwide Corp.

A
  • Company challenged unfairness authority of FTC to require more than minimum standards.
  • 3rd Circuit upheld FTC authority.
  • Then company entered into CD. Agreed to maintain comprehensive infosec program, etc.
184
Q

In the Matter of LabMD, Inc.

A
  • Company chose to fight rather than settle.
  • Hack led to sensitive info of customers being stolen.
  • FTC brought action - lost at ALJ level, won at commissioner level, but lost at 11th circuit. 11th said standard of requiring “reasonable” data security measures to achieve fairness was too vague and violated company’s due process rights because not know prior what the standard is.
185
Q

FTC Enforcement History

A
  • From late 1990s - Chairman Pitofsky approach = “notice and choice”. Enforcement actions based on deception and failure to comply with privacy notice, rather than specific, tangible harm to consumers.
  • From 2001 to 2009, Chairman Muris and Platt-Majors emphasized “harm-based model” for enforcement, i.e. harms due to identity theft, and invoked unfairness.
  • 2009, Chairman Leibowitz, began including requirement of comperhensive privacy program in CDs, and beyond tangible harm.
  • 2009 approach reflected in 2012 White House and FTC reports.
186
Q

What happened in the GoeCities, Inc case?

A

GeoCities was found to misrepresent how they used user info and they collected and maintained children’s PI w/o consent. consent order required them to post accurate and conspicuous privacy notice and get child parents consent

187
Q

What happened in the Microsoft Corp matter?

A

FTC found the “high-level” online security claims were misleading because this security process was in the control of 3rd party vendors. They also collected and shared more info than claimed int he privacy notice.

188
Q

What happened in the FB case?

A

deceptive case. FB repeatedly changed services so previously private info was made public. Settlement required FC to provide users with clear notice and obtain consent before making these changes.

189
Q

What was Obama’s big privacy report?

A

2012 - Consumer Data Privacy in a Networked Word: a Framework for protecting Privacy and Promoting innovation. Ushered in the “notice and consent approach.” The rights that were stressed to apply were

  1. Individual control
  2. Transparency
  3. Respect for context
  4. Security
  5. Access and Accuracy
  6. Focused collection
  7. Accountability
190
Q

FTC report written around the same time as the 2012 Obama. report.

A

Emphasizes three areas
1. Privacy by Design - incorporate privacy at all stages of business.
2. Simplified Consumer choice.
Transparency

also

Do Not Track
Mobile
Data brokers
Large platform providers
Promoting enforceable self-regulatory codes.
191
Q

What does Section 5(a) under the FTC Act prohibit?

A

“Unfair or deceptive acts or practices in or affecting commerce.”

192
Q

True or false?

For data breach notification, state laws require email notice to be the default mode of communication.

A

False

193
Q

Briefly summarize the FTC’s powers.

A

Preventing unfair methods of competition and unfair or deceptive acts or practices in or affecting commerce,

seeking monetary redress and other relief for conduct injurious to consumers,

prescribing trade regulation rules, defining with specificity acts or practices that are unfair or deceptive,

establishing requirements designed to prevent such acts or practices.

194
Q

True or false? At the state level, the FTC brings a variety of privacy-related enforcement actions pursuant to state laws prohibiting unfair and deceptive practices.

A

False. State attorneys general enforce state privacy-related laws.

195
Q

Which U.S. statutes provide the FTC with additional enforcement authority over privacy issues?

A

The Children’s Online Privacy Protection Act (COPPA),

the Fair Credit Reporting Act (FCRA),

the Gramm-Leach Bliley Act (GLBA),

the CAN-SPAM Act

196
Q

What does Section 5(a) under the FTC Act prohibit?

A

“Unfair or deceptive acts or practices in or affecting commerce.”

197
Q

What additional technologies or areas that may be of concern to the FTC now or in the near future?

A

A few are listed below:
• Algorithms
• Artificial intelligence
• Predictive analytics

198
Q

“In the Matter of Wyndham Worldwide Corp.
The FTC’s unfairness authority was upheld in the federal courts in litigation against Wyndham Worldwide Corporation, a hotel company that suffered three hacks to its systems from 2008 to 2009. Based on these breaches to its systems, the FTC investigated Wyndham for unfair and deceptive trade practices. The FTC asserted that Wyndham:

A

1) Stored credit card information in unencrypted text
2) Permitted passwords for property management systems to be easily guessable
3) Failed to use firewalls between individual hotels, corporate systems and theInternet
4) Allowed out-of-date operating systems to run on property management systems and failed to update these computers with timely security updates”
5) Failed to adequately control computer access by third-party vendors
6) Did not have unauthorized access detection measures in place
7) Failed to add security measures after they suffered known breaches