FINANCIER DATA PROTECTION & PRIVACY LAWS ANNUAL REVIEW ONLINE CONTENT DECEMBER 2016 R E P R I N T F I N A N C I E R W O R L D W I D E.

Similar documents
Preparing for California's New Privacy Law Will Make for a Busy 2019 for Legal, IT and Info Governance Departments

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

ARE YOU HIP WITH HIPAA?

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

FRAMEWORK FOR CONSUMER PRIVACY LEGISLATION

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

Cybersecurity Curveballs in Vendor Risk Management Programs

How to mitigate risks, liabilities and costs of data breach of health information by third parties

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

Blockchain. Technologies. Team Overview. Seyfarth Shaw Blockchain Technologies 1

HEALTHCARE BREACH TRIAGE

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

It s as AWESOME as You Think It Is!

Be Careful What You Wish For: The Final Rule Is Out

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA Security How secure and compliant are you from this 5 letter word?

HIPAA and Lawyers: Your stakes have just been raised

A Special Type of Government Scrutiny: Pharmaceutical Manufacturer Relationships with Specialty Pharmacies: Part II

Fraud risk management. Oil and gas sector

Anticipating the Burden of Risk:

Determining Whether You Are a Business Associate

RIMS Cyber Presentation

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

HIPAA Compliance Guide

Allianz Global Corporate & Specialty Pacific. Allianz Cyber Protect Premium

Navigating the New Federal and State Debt Collection Enforcement Landscape Presented by Venable LLP Speakers:

Emerging legal and regulatory risks

Building a Program to Manage the Vendor Management Lifecycle

T A B L E of C O N T E N T S

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

THE ETHICS OF OUTSOURCING LEGAL SERVICES

Title CIHI Submission: 2014 Prescribed Entity Review

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

"HIPAA RULES AND COMPLIANCE"

Healthcare Data Breaches: Handle with Care.

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996.

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

Negotiating Business Associate Agreements

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION

Cyber Insurance 2017:

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

ADVANCED CONTRACT LAW

Cyber & Privacy Liability and Technology E&0

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

Omnibus Rule: HIPAA 2.0 for Law Firms

Amadeus Global Report 2016 A business, financial and sustainability overview. Corporate risk management

HIPAA and ProAssurance

HIPAA Enforcement Under the HITECH Act; The Gloves Come Off

Cyber Risks & Insurance

Beyond the General Data Protection Regulation (GDPR)

Pension Scheme Cyber Resilence Workshop

How we manage risk. Risk philosophy. Risk policy. Risk framework

DEBUNKING MYTHS FOR CYBER INSURANCE

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE January 3, I. Executive Summary.

Alternative Investments Advisory Services. kpmg.com

Redesign of DC plans focuses on building the right oversight process moving forward.

Cyber Enhancement Endorsement

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

SANDHILLS CENTER MH/DD/SAS NOTICE OF PRIVACY PRACTICES

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

FEATURE ARTICLE: INVESTING IN TECHNOLOGY COMPANIES

HIPAA Privacy and Security Breaches 10 Things To Know

The General Data Protection Regulation s Impact on M&A

Claudia Callaway Christina J. Grigorian

FINANCIER. Q&A: Portfolio valuation SPECIAL REPORT DECEMBER 2015 ISSUE R E P R I N T. REPRINTED FROM

Business Associate Contracts: Time Is Running Out...

H 7789 S T A T E O F R H O D E I S L A N D

HIPAA Compliance Under the Magnifying Glass

The American Recovery and Reinvestment Act of 2009: Health Information Privacy and Security Provisions Here We Go Again

Anatomy of a Data Breach

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES

The Impact of Technology on Nonprofit Governance (and its Regulation)

NOTICE OF PRIVACY PRACTICES This Notice is effective March 26, 2013

Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences

RISK FACTORS RISKS RELATING TO PARTICIPATION IN THE TOKEN SALE

UK Motor Insurance Insights: Managing the challenges of digital risk

Hot Topics in Software as a Service and Cloud

Managing Risks in a Rapidly Changing Landscape series:

HIPAA PRIVACY AND SECURITY AWARENESS

W. Reece Hirsch Davis Wright Tremaine LLP (415) (206)

University Data Policies

AppLovin Data Processing Agreement

BERMUDA MONETARY AUTHORITY THE INSURANCE CODE OF CONDUCT FEBRUARY 2010

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

Risk Management Policy and Procedures.

U.S. Private-sector Privacy Certification

HIPAA Background and History

BERNSTEIN. 34 th Annual Strategic Decisions Conference. David Wichmann, CEO May 31, 2018

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

1 Security 101 for Covered Entities

AS PASSED BY HOUSE AND SENATE H Page 1 of 37 H.764. An act relating to data brokers and consumer protection

UCLA Policy 420: Breaches of Computerized Personal Information

HIPAA Security. ible. isions. Requirements, and their implementation. reader has

How to Choose a Total Chargeback Management Provider

HITECH/HIPAA Omnibus Final Rule: Implications for Hospices. Elizabeth S. Warren May 3, 2013

COMMISSION OF THE EUROPEAN COMMUNITIES

Privacy and Data Breach Protection Modular application form

Transcription:

R E P R I N T F I N A N C I E R W O R L D W I D E. C O M ANNUAL REVIEW DATA PROTECTION & PRIVACY LAWS REPRINTED FROM ONLINE CONTENT DECEMBER 2016 2016 Financier Worldwide Limited Permission to use this reprint has been granted by the publisher PREPARED ON BEHALF OF FINANCIER WORLDWIDE corporatefinanceintelligence www.financierworldwide.com

UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Q IN YOUR EXPERIENCE, DO COMPANIES IN THE US PAY ENOUGH ATTENTION TO THE RISKS ASSOCIATED WITH DATA PROTECTION? ARE THEY BEGINNING TO FULLY UNDERSTAND THEIR DUTIES OF CONFIDENTIALITY AND PRIVACY IN THE DIGITAL AGE? FRIEL: With electronic data an important and valuable asset and data collection, exploitation and sharing becoming increasingly pervasive, organisations are becoming increasingly aware that they should review legal and self-regulatory requirements whenever they are involved in consumer or employee data collection, use, processing, storage or transfer or in transactions where data assets or activities are involved. In addition, consumer data privacy and security issues, including many high profile security breaches, have recently spawned consumer class action and shareholder derivative lawsuits involving various tort and unfair business practices theories, the viability of which are not yet settled. The Securities and Exchange Commission and boards of directors have taken note, and oversight of information management governance and preparedness at the board and C-suite level are becoming the norm. Some of the liability risks may be covered by insurance and the number of companies taking such coverage has increased, though as the law in this area continues to evolve, so do insurers exclusions and specialty policies. Q COULD YOU OUTLINE THE LATEST LEGAL AND REGULATORY DEVELOPMENTS AFFECTING CORPORATE STORAGE, HANDLING AND TRANSFER OF DATA IN THE US? FRIEL: The US lacks an omnibus data protection regime. Instead, data privacy and security requirements reside in a variety of different federal and state laws. Federal laws take a sectoral approach, regulating particular industries, such as healthcare, or issues including children s privacy. Some state laws are more comprehensive and frequently set a higher compliance standard. There are also various self-regulatory programmes regarding data privacy protection that apply to various industries and practices, such as interestbased advertising. Even for companies not in highly regulated industries, like healthcare and financial services, the Federal Trade Commission (FTC), which has jurisdiction over the vast majority of commercial enterprises under Section 5 of the FTC Act which prohibits deceptive and unfair business practices, requires accurate disclosure of material data privacy practices and encourages data subject choice. Section 5 of the FTC also requires companies to maintain reasonable data security safeguards. REPRINT FINANCIER WORLDWIDE DECEMBER 2016

UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Q IN WHAT WAYS HAVE THE AUTHORITIES INCREASED THEIR MONITORING AND ENFORCEMENT ACTIVITIES WITH RESPECT TO DATA PROTECTION AND PRIVACY IN RECENT YEARS? FRIEL: Of the approximately 300 data breach incidents we have seen in the last year alone, 24 percent resulted in regulatory investigations or inquiries and 6 percent resulted in litigation. The Department of Health and Human Services Office for Civil Rights (OCR) initiated an investigation of incidents involving more than 500 individuals in nearly 100 percent of the HIPAA health record related breaches we saw, but rarely for incidents involving fewer data subjects. Of more than 100 OCR investigations, only two resulted in finalised resolution agreements. Certain state attorneys general (AGs) have also been active in investigating breaches. AGs initiated investigations in 36 percent of our non-healthcare incidents and 26 percent of the healthcare incidents. Regulatory enforcement regarding lack of adequate security following a breach is also likely to continue. As for privacy, the FTC is the most active regulator, using its Section 5 deception authority to go after inaccurate privacy promises. Q WHAT INSIGHTS CAN WE DRAW FROM RECENT HIGH- PROFILE DATA BREACHES? WHAT IMPACT HAVE THESE SITUATIONS HAD ON THE DATA PROTECTION LANDSCAPE? FRIEL: Based on our experience of data breaches in 2015, the industries affected were 23 percent healthcare, 18 percent financial services, 16 percent education, 12 percent retail, 9 percent restaurant and hospitality, 6 percent government, 6 percent insurance, 2 percent professional services and 8 percent others. This mix tends to reflect the sensitivity and value of the data collected and used by these respective industries. Of these, 63 percent were private, 14 percent public, 7 percent non-profit and 16 percent other, which could suggest that private companies have less secure data than public and government entities. In terms of company size, 8 percent had revenue greater than $5bn, 32 percent between $1bn and $5bn, 9 percent from $501m to $1bn, 17 percent in the $151m to $500m range, 9 percent between $50m and $150m and 25 percent less than $50m. This shows that data incidents affect companies of all sizes. DECEMBER 2016 FINANCIER WORLDWIDE REPRINT 8

UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Organisations need a contingency plan in place to prepare for near-inevitable compliance failures and security breaches. Q THE USE OF THIRD PARTIES, SUCH AS CONSULTANTS, AGENTS AND DISTRIBUTERS, EXPOSES FIRMS TO UNIQUE DATA PROTECTION RISKS. WHAT ARE SOME OF THESE RISKS AND WHAT STEPS CAN BE TAKEN TO MITIGATE THEM? FRIEL: In 2015, 14 percent of the security incidents we saw were the result of vendors. Where there are specific data security legal obligations in the US, vendor data security diligence, management and compliance is required. The same is included in all government and industry guidance on what constitutes a reasonable data security programmes. Privacy and data ownership and use issues are becoming of greater concern as big data uses such as for analytics, cross-device consumer matching, market intelligence and dynamic pricing evolve. When engaging vendors, companies need to clarify in the contract who, as between the parties, owns the data, what the vendor can use it for and under what circumstances, for example, the use of aggregate or de-identified data, not attributable to the company or its data subjects permitted for the vendor s own use, the security and breach response responsibilities, cyber risk insurance obligations, and the application of indemnity, and liability limitations, on confidentiality, privacy and security violations. Q WHAT CAN COMPANIES DO TO MANAGE INTERNAL DATA PRIVACY RISKS AND THREATS, SUCH AS LIABILITIES ARISING FROM LOST DEVICES OR THE ACTIONS OF ROGUE EMPLOYEES? FRIEL: Companies need to develop robust information management programmes which provide a framework for managing an organisation s data and which consider the protection of that data. Effective programmes need to take an enterprise-wide approach and set policies and procedures according to the business value of the information. That value is based on business considerations as well as legal and regulatory requirements and attendant risk. Programmes are most effective when they reflect the input of all relevant stakeholders, including business units, legal, privacy, compliance, IT and IS. A sound programme should also be adaptable to regulatory changes. Programmes should be built on an operational lifecycle approach where the aim is to assess, protect, sustain and respond with the cycle constantly repeating. Programmes should be managed in a way that there is accountability, and should establish goals and measure performance. REPRINT FINANCIER WORLDWIDE DECEMBER 2016

UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Q WHAT ADVICE CAN YOU OFFER TO COMPANIES IN THE US ON MANAGING DATA RISK, INSTALLING INTERNAL COMPLIANCE PROCESSES AND MAINTAINING COMPLIANCE ON DATA PRIVACY GOING FORWARD? FRIEL: Consistent with FTC guidance, we recommend that organisations appoint a senior level executive to specifically keep abreast of the development of the law in this area and to work to institute an information management programme that combines information governance policies and procedures and addresses data privacy and security issues as products, services, methodologies and practices are developed, rather than addressing them as an afterthought when making changes to comply with law or to minimise risk, which may be more difficult and costly. Compliance programmes should include an assessment of an organisation s data collection, processing, use, storage and transfer practices to ensure that its privacy and security policies are accurate and sufficient. The organisation s practices, and those of its vendors, should be monitored to ensure compliance with those policies. Ongoing impact assessments should also be applied to new products and practices. Finally, organisations need a contingency plan in place to prepare for near-inevitable compliance failures and security breaches. www.bakerlaw.com Alan L. Friel Partner BakerHostetler +1 (310) 442 8860 afriel@bakerlaw.com Alan Friel is a partner in BakerHostetler s Los Angeles office where he coordinates the firm s advertising, retailing, and e-commerce industry initiative and is a member of its privacy and data security, and content, platforms and software teams. He is also an adjunct professor at UCLA and Loyola Marymount Law Schools, and was named one of the most influential lawyers in Digital Media and ecommerce Law by the Los Angeles Business Journal. DECEMBER 2016 FINANCIER WORLDWIDE REPRINT

FW S U P P L E M E N T A N N U A L R E V I E W www.financierworldwide.com