Accountability, Act, and, Breach, breach notification, brokers, Congress, data, Data Accountability and Trust Act, Data Privacy Law or Regulation, data security, H-R-2221, information, information brokers, Law, notification, or, privacy, Regulation, Security, Trust
The Breach Notification Obligations in the Data Accountability and Trust Act
By InfoLawGroup LLP on February 22, 2010
contracting, contracts, indemnification, reasonable, reasonable security, Security, security measures, security schedule, service provider
Developing an Information Security and Privacy Schedule for Service Provider Transactions (Part Two)
By InfoLawGroup LLP on February 18, 2010
contracting, contracts, indemnification, reasonable, reasonable security, Security, security measures, security schedule, service provider
Developing an Information Security and Privacy Schedule for Service Provider Transactions
By InfoLawGroup LLP on February 15, 2010
cloud computing, EU Directive, international data transfers, model contracts, outsourcing, standard contract clauses, standard contractual clauses, transborder data flows
EU Adopts New Standard Contract Clauses for Foreign Processors
By W. Scott Blackmer on February 08, 2010
The European Commission has announced a new set of standard contractual clauses to be used in agreements with processors located outside the EU / EEA. The new SCCs represent an effort to better ensure privacy protection when European personal data are passed on to subcontractors in business process outsourcing, cloud computing, and other contexts of successive data sharing.
cloud computing, data integrity, evidence, proof, standards
Data Integrity and Evidence in the Cloud
By W. Scott Blackmer on January 29, 2010
Data integrity is a potential challenge in cloud computing, with implications for both operational efficiency and legal evidence. Vendors should consider a standards-based approach to assuring data integrity, and customers should address the issue in due diligence and in contracting.
201 CMR 17-00, AES, anonymity, behavioral advertising, breach notification, California, cloud computing, contracts, DPA, Eavesdropping, encryption, EU Data Protection Directive, GLBA, HIPAA, HITECH, IAPP, Kearney, Massachusetts, personally identifiable information, pii, RFID, social networking, spam, SSN, TCPA, telemarketing, text messages, UK ICO, VPPA
Celebrating Data Privacy from A to Z
By InfoLawGroup LLP on January 28, 2010
In honor of Data Privacy Day and its spirit of education, I thought it might be appropriate (and fun) to celebrate some (but certainly not all) of the A, B, Cs of Data Privacy. Would love to see your contributions, too!
ADCR, banking, Breach, Heartland, PCI DSS, security breach litigation, settlement
Issuing Banks File Class Action Suit Against Acquiring Banks in Heartland Breach Matter
By InfoLawGroup LLP on January 21, 2010
creditors, deadline, extensions, FACTA, financial institutions, FTC, identity theft, June 1, prevention program, primer, Red Flags Rule
Is Your Organization's Red Flags Rule Identity Theft Prevention Program Ready for Primetime?
By InfoLawGroup LLP on January 18, 2010
As our readers know, the FTC, after four extensions of the deadline, currently intends to begin enforcing the Red Flags Rule with respect to organizations subject to its jurisdiction on June 1, 2010. In the meantime, the Red Flags Rule remains in effect as to all financial institutions and creditors (and has been subject to enforcement by the banking regulators since November 1, 2008). Although a recent decision of the United States District Court for the District of Columbia, ABA v. FTC, brought lawyers outside the scope of the Rule, the Rule remains broad and covers a wide range of entities as "creditors." Creditors subject to the FTC's jurisdiction need to have their written Red Flags Rule Identity Theft Prevention Programs prepared, approved by the Board, and implemented by June 1. For more on the history and the requirements of the Rule, see my recent article, "The FACTA Red Flags Rule: A Primer," published in Bloomberg Law Reports - Risk & Compliance, reproduced here with the permission of Bloomberg.
agreements, breach notice, certification, compliance, confidentiality, contracts, incident response, indemnification, information security, insurance, liability, risk management, standards
Information Security Clauses and Certifications - Part 1
By W. Scott Blackmer on January 17, 2010
Service contracts that involve protected personal information should include provisions allocating responsibility for protecting that information and responding to security breaches. Increasingly, this means incorporating specific references to applicable laws and information security standards, and often certifications of conformance.
Upcoming ILG Speaking Engagements (1.1.11-3.31.11)
By InfoLawGroup LLP on January 14, 2010
banking, FFIEC, measures, online, online banking, reasonable, reasonable security, Security, security breach litigation, security breach litigation security measures, security standards, Shames-Yeakel, UCC 4A-202
Online Banking and "Reasonable Security" Under the Law: Breaking New Ground?
By InfoLawGroup LLP on January 13, 2010
FTC, Leibowitz, online privacy, opt-in, opt-out, personal information, privacy, reasonable expectation, self-regulatory, Vladeck
Are We Living in a Post-Disclosure, Opt-In World?
By InfoLawGroup LLP on January 11, 2010
Today's New York Times Media Decoder Blog features an "on-the-record" discussion with Federal Trade Commission chairman Jon Leibowitz and Bureau of Consumer Protection chief David Vladeck. The question presented: "Has Internet Gone Beyond Privacy Policies?" The FTC (and Congress, for that matter) continue to signal that change may be imminent in the world of online privacy policies and traditional notions of opt-out consent.
Breach, Heartland, Payment Card Industry Digital Security Standard, PCI DSS, settlement, TJX
Quickhits: Heartland Settles With Visa for $60 Million
By InfoLawGroup LLP on January 08, 2010
Breach, Cloud, Countrywide, credit monitoring, security breach litigation, security measures, settlement
Quickhits: Security in the Ether; Countrywide Settles Data Breach Case
By InfoLawGroup LLP on January 05, 2010
ADCR, BJ, BJ Wholesale Club, Breach, card, Club, damages, doctrine, economic, economic loss doctrine, fraud, Hannaford, litigation, loss, Massachusetts, mastercard, negligence, payment, payment card, PCI DSS, PCI DSS litigation, retailers, TJX, unfair practices, unfair practices Massachusetts visa mastercard ADCR, visa, Wholesale
Massachusetts's Highest Court Delivers BJ Wholesalers (and other Retailers) a Data Breach Liability Gift
By InfoLawGroup LLP on December 23, 2009
payment card, payment card security breach litigation, PCI DSS, PCI DSS heartland, security breach litigation
Quickhits: AMEX settles with Heartland Payment Systems for $3.6 Million
By InfoLawGroup LLP on December 22, 2009
discovery, electronic communications service, Hotmail, Quon, remote computing service, Stored Communications Act, text, Weaver, webmail
More on the Cloud, Discovery, and the Stored Communications Act
By InfoLawGroup LLP on December 16, 2009
My former colleague and friend Nolan Goldberg has written this nice piece on "Securing Communications in the Cloud" regarding the Central District of Illinois decision in US v. Weaver (yet another child pornography case contributing to the development of information law). Nolan points out the Weaver court's focus on the unique nature of web (or cloud)-based email services. With webmail, a copy stored by the host in the cloud, in this case Microsoft Hotmail, might be the only copy, not just a backup. Therefore, the logic goes under the Stored Communications Act, the emails sought by the government in Weaver were not in electronic storage and the government only needed a trial subpoena, not a warrant.
breach notification, Congress, Data Accountability and Trust Act, data brokers, data security, H-R-2221, information brokers, Security, WISP
House Passes Data Accountability and Trust Act (DATA)
By InfoLawGroup LLP on December 10, 2009
litigation, payment, payment card, PCI DSS, PCI DSS Radiant Systems, Radiant, Savvis, security breach litigation, security breach litigation service provider, service provider, Systems
The Merchants Strike Back?
By InfoLawGroup LLP on December 03, 2009
access, admissibility, case law, collection, control, cost, disposal, Judge Grimm, litigation, Lorraine, metadata, preservation, retention, Rule 26, Zubulake
Legal Implications of Cloud Computing -- Part Four (E-Discovery and Digital Evidence)
By InfoLawGroup LLP on November 27, 2009
Back by popular demand, this is Part Four in our ongoing series, Legal Implications of Cloud Computing. This installment will focus on digital evidence and e-discovery, and follows up on Part One (the Basics), Part Two (Privacy), and Part Three (Relationships). After all, what better topic than the cloud to tackle on the day after Thanksgiving, recovering from tryptophan and wine? As with many other areas previously discussed in this series, the cloud does not necessarily change the legal analysis, it just highlights the need to think through and anticipate the many areas of legal concern that could/are likely to arise when using the cloud. As a litigator, when I think about the challenges posed by the cloud, the one that seems most intuitive is e-discovery/digital evidence. It is always difficult to fully appreciate and digest the scope and volume of information that may be called for in litigation or in an investigation. The presence of corporate data in the cloud multiplies those considerations. Some, but by no means all, of the digital evidence issues that should be considered in negotiating cloud arrangements and contracts (whether you are putting data in the cloud or designing and marketing a cloud offering), are as follows: 1. preservation/retention/disposal; 2. control/access/collection; 3. metadata; 4. admissibility; and, cutting across all of the foregoing 5. cost. As I will discuss below, like other forms of electronically stored information (ESI), one of the best ways for addressing data in the cloud in the discovery and evidentiary context is to plan ahead and discuss treatment of cloud data (a) in records retention policies well in advance of litigation; and (b) at the Rule 26 conference once litigation has commenced. And, if you read to the end, I will comment on the paucity of case law referencing the cloud (and describe the few references that have appeared in federal and state case law to date).