CASL Computer Programs Provisions and Challenges in Specific Vertical Sectors Michael Fekete (Osler) Howard Fohr (BlackBerry Limited) April 30, 2014.

Slides:



Advertisements
Similar presentations
Transparency and Domestic Regulation Mina Mashayekhi Division on International Trade UNCTAD.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
Five Steps in 5 Minutes Close deals faster, more easily, more often! 1.Start a Quote: Input deal amounts and review the available lease options 2.Create.
Bill c CASL Effects of the Canadian Anti-Spam Legislation (CASL) at Skate Canada.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
IMPORTANT READ CAREFULLY BEFORE USING THIS PRODUCT LICENSE AGREEMENT AND LIMITED WARRANTY BY INSTALLING OR USING THE SOFTWARE, FILES OR OTHER ELECTRONIC.
CareCentrix Direct Training.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
The Data Protection (Jersey) Law 2005.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
How to get started RMA Portal ZEBRA TECHNOLOGIES March 19, 2015.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
Canada’s New Anti-Spam Legislation: Compliance Challenges and Risk Mitigation Strategies IT.CAN 18 th Annual Conference October 20, 2014 Craig T. McDougall.
Hogan Lovells EU Product Safety and Market Surveillance Reforms How will this impact businesses – Lawyers' view BIICL seminar, 2 October.
1 Regulatory Framework for C&I Regimes Presented by Andrew Kwan ITU Consultant Conformity and Interoperability Training for ARB Region on Type Approval.
2/16/2010 The Family Educational Records and Privacy Act.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
ICAICT202A - Work and communicate effectively in an IT environment
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
National Smartcard Project Work Package 8 – Security Issues Report.
Presented by Bishop & McKenzie LLP May 30, Vancouver Sun, “Anti-Spam Legislation Has Businesses Scrambling to Comply”, May 26, 2014.
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
A Guide to the BIZNET Online Filing System STATE OF CONNECTICUT DEPARTMENT OF CHILDREN & FAMILIES (DCF) DEPARTMENT OF DEVELOPMENTAL SERVICES (DDS) DEPARTMENT.
Tri-Counties Regional Center (TCRC) DS1891 Compliance Website Information and Instructions Biennial Requirement to Update Form DS1891 – Applicant/Vendor.
E-Commerce Directive 2002 Overview. This Map It was derived from Complying with the E-Commerce Regulations 2002 by the DTI.
1 Permits, Licenses and Inspections Regional Project Introductions: Home Builders & Remodelers Association of Cape Cod State Project Sponsor & Technical.
Software Updates © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
McCarthy Tétrault Advance™ Building Capabilities for Growth Canada’s Anti-spam Law (CASL): Navigating the Computer Program Provisions April 30, 2014 McCarthy.
Cookie compliance: your 5 day emergency action plan Claire Walker.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Canada’s Anti Spam Legislation. What is CASL? CASL was intended to combat negative online behaviour  spam  phishing  malware  spyware  It will create.
Patient Protection and Affordable Care Act March 23, 2010.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
Statistics Monitor of SPMSII Warrior Team Pu Su Heng Tan Kening Zhang.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Draft Policy Standardize IP Reassignment Registration Requirements ARIN XXVI 6 October, 2010 – Atlanta, Georgia Chris Grundemann.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
LEGAL ASPECTS OF DIGITAL LIBRARIES By TALWANT SINGH ADDL DISTT. & SESSIONS JUDGE; DELHI.
AUDIT IN COMPUTERIZED ENVIRONMENT
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
New OJEU Standard Forms Key Changes Pre-filling Information Minimum Time Limits Mandatory Fields OJEU Form Walk Through.
Protection of Personal Information Act An Analysis on the impact.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Denise Chrysler, JD Director, Mid-States Region
Anti-Spam Requirements- Preparing to Comply with CASL
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
Microsoft 365 Get help with regulatory compliance
Data Protection The Current Regime
Technical Steps to Install Norton Mobile Security on Android Phone.
How to register and use ODMAP for Fire/EMS and other partners
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
General Data Protection Regulation
The activity of Art. 29. Working Party György Halmos
Mobile Registration App Training Guide for OPO Staffers
Presentation transcript:

CASL Computer Programs Provisions and Challenges in Specific Vertical Sectors Michael Fekete (Osler) Howard Fohr (BlackBerry Limited) April 30, 2014

Key Verticals 2  Software  Mobile/Telecom  Product manufacturing  Online businesses

Software Vertical - Identifying regulated activities 3  Pre-installed/embedded software? RIAS: “...the requirements under CASL for the installation of computer programs only apply to the installation of computer programs on another person’s computer system”  User initiated installations (e.g., downloads)? RIAS: “CASL will not apply to installations carried out by persons on their own computing devices.”  Updates and upgrades What if the installation is carried out by the consumer?  Installations by IT help desks  Installations on devices in other countries

Identifying Exempt Activities 4  Law enforcement, protection/defence of Canada, international affairs  Public safety

Assessing whether the “enhanced disclosure” rules apply 5  Function listed in s.10(5) AND  Knowledge and intent that function will cause the computer system to operate in a manner that is “contrary to the reasonable expectations of the owner or an authorized user of the computer system”  Operational challenges software products update programs

Applying the knowledge and intent qualifier 6  Is it reasonable to take into account “reasonableness” overall, including whether: The function is required for the very services the user signed up to receive? The function would improve the services? The function would provide some other utility to the user (outside of the particular software/services at issue)? The function would have some non-invasive business purpose/utility for the vendor?  How much information do consumers reasonably want? Do they want to understand the technical details, or do they want it to “just work”?

Deciding whether/when to request consent 7 Reliance on exceptions?  What “conduct” is required to demonstrate it is reasonable to believe consent has been given Reliance on 3 year transition provision (s.67)? Seeking consent to updates and upgrades at the same time as consent for installation/downloading/first use?

Developing strategy for obtaining “CASL- compliant” express consent 8 Can consent be obtained through a licence agreement (if 10(4) not triggered)? Can consent be obtained through the use of a pre-checked box (e.g., default settings, with user confirmation)? Can consent be obtained for a “suite” of products? Can consent to updates and upgrades be mandatory? Can identity and contact information be provided through links?

Satisfying the Disclosure Rules 9  Minimum disclosures: Describe the “function and purpose”  “clearly and simply”  “in general terms”  Enhanced disclosures:  Describe the “program’s material elements that perform the function or functions, including the nature and purpose of those elements and their reasonably foreseeable impact on the operation of the computer system” “clearly and prominently” “separately and apart from license agreement” “separately from any other information provided” “acknowledgement in writing... that they understand and agree”

Proving Consent 10  CRTC Enforcement Bulletin ( ) “The Commission considers that the requirement for consent in writing is satisfied by information in electronic form if the information can subsequently be verified.” “Examples of acceptable means of obtaining consent in writing include checking a box on a web page to indicate consent where a record of the date, time, purpose, and manner of that consent is stored in a database; and filling out a consent form at a point of purchase.”

Satisfying the withdrawal of consent rule (s.11(5)) 11  When does obligation to provide an electronic address apply? Only if program performs a function regulated by s.10(4)? Exempt if the program is covered by s.10(8)?  How must contact information be provided?

“Deemed” express consent (s. 10(8)) 12 A person is considered to expressly consent to the installation of a computer program if: a) the program is: i. a cookie, ii. HTML code, iii. Java Scripts, iv. an operating system, v. any other program that is executable only through the use of another computer program whose installation or use the person has previously expressly consented to, or vi. any other program specified in the regulations; and b) the person’s conduct is such that it is reasonable to believe that they consent to the program’s installation.

“Deemed” express consent for network security & updating a network (IC Reg’s, s. 6(a) & (b)) 13  (a) a program that is installed by or on behalf of a telecommunications service provider solely to protect the security of all or part of its network from a current and identifiable threat to the availability, reliability, efficiency or optimal use of its network;  (b) a program that is installed, for the purpose of updating or upgrading the network, by or on behalf of the telecommunications service provider who owns or operates the network on the computer systems that constitute all or part of the network;

“Deemed” express consent - Questions for both s. 6(a) & (b) of IC Reg’s 14  Non-definition of a “network”  How to identify the “end node” of the network?  Applicability to not just parts of a network that require a 24/7 ‘live’ connection to a telecommunications service? E.g. What about a program which could be used in some cases without active/online wireless connectivity?

“Deemed” express consent - Questions for both s. 6(a) & (b) of IC Reg’s 15  Definition of “telecommunications service provider”  Broad?  Not so broad, due to constitutional limitations? (e.g. applicability of CASL’s computer program provisions to intraprovincial communications?)

“Deemed” express consent - Questions for s. 6(a) of IC Reg’s (network security exemption) 16  Is a “threat to the availability, reliability, efficiency or optimal use” just: Malware? Viruses? Software bug? Other?  What is a “current and identifiable” threat? Threats that are not ‘identifiable’ in addition to being ‘current’? What about ‘future’ security threats?  “Solely” – is the exemption available if the program has an additional legitimate purpose in addition to just addressing a ‘security’ threat?

“Deemed” express consent (IC Reg’s, s. 6(c) – correcting a failure) 17  (c) a program that is necessary to correct a failure in the operation of the computer system or a program installed on it and is installed solely for that purpose.  “Solely” – is the exemption available if the program provided ‘new’, improved or additional functionality or features, and not “solely” bug fixes?

“Deemed” express consent - Questions for each of s. 6(a), (b) & (c) of IC Reg’s 18  How to assess whether the person’s conduct is such that they consent to the program’s installation (s. 10(8)(b))?

Additional Compliance Challenges and Solutions – Mobile/Telecom 19 Scenario I:  Initial software updates during “Out Of Box Experience” (OOBE) for a new BlackBerry 10 device

Out Of Box Experience (OOBE) on BlackBerry 10 - First substantive step after user chooses UI language is acceptance of BlackBerry Solution License Agreement, which indicates software may automatically check for updates and that BlackBerry may make required updates available

OOBE on BlackBerry 10 (cont’d) - The last substantive step before completion of initial setup is a user notice regarding software update as part of the OOBE (most current OS available for relevant carrier/region)

22 Scenario II:  3rd Party App Submission Process in BlackBerry World Additional Compliance Challenges and Solutions – Mobile/Telecom

Step 1: Developer creates a Vendor account – after acceptance of BlackBerry World vendor terms, etc various fields made available for vendor to complete. - These include for vendor identification and contact info. 3rd Party App Submission Process in BlackBerry World

Step 1 (cont’d): fields also made available for vendor’s support , Privacy Policy url etc. 3rd Party App Submission Process in BlackBerry World (cont’d)

Step 2: App submission process: Vendor creates the listing for the app under their Vendor account. 3rd Party App Submission Process in BlackBerry World (cont’d)

Step 2 (cont’d): Vendor adds Descriptive text which will be seen by the user when they view the app in BlackBerry World, prior to download. Substantial space available in “Long Description” – vendor free to provide information about the function and purpose of the computer program (or to provide additional disclosures as may be required by s. 10(4) or (5) of CASL if the vendor so chooses (presumably ‘separate and apart from the license agreement’ as it is prior to download).) 3rd Party App Submission Process in BlackBerry World (cont’d)

Step 2 (cont’d): Vendor adds App icon and screenshots 3rd Party App Submission Process in BlackBerry World (cont’d)

Step 2 (cont’d): Vendor can limit the availability of their app by Carrier and or Country 3rd Party App Submission Process in BlackBerry World (cont’d)

Step 3: End user process: Once app accepted for distribution in BlackBerry World, it is made available for users to access in BlackBerry World, either through the user browsing or searching for the desired app 3rd Party App Submission Process in BlackBerry World (cont’d)

Step 3: End user process (cont’d): Users goes to the app listing in BlackBerry World, to view the information that the vendor had input about the app 3rd Party App Submission Process in BlackBerry World (cont’d)

Users chooses to download the app Step 3 (cont’d): BlackBerry World End user process:

Users presented with any required permissions sought by app prior to using the software (Note: outside of BlackBerry World, once the user is in the app the vendor may also provide its EULA or other notice(s) for acceptance etc). Step 4: App permissions notice to end user

Additional Compliance Challenges and Solutions – Product Manufacturing 33  Lack of direct interaction with consumers Express consent Exceptions to consent  Obtaining consent for products with no user interface  Global marketplace challenges

Additional Compliance Challenges and Solutions – Online Business 34  Cookies  Java scripts  HTML code