© 2007 Morrison & Foerster LLP All Rights Reserved Privacy and Information Security Monthly Update January 9, 2007 Andrew Smith Tom Scanlon Joyita Basu.

Slides:



Advertisements
Similar presentations
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Advertisements

Virginia State Bar Annual Meeting Corporate Counsel Section Update on Do Not Call & Spam Michael Goodman Federal Trade Commission
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
© 2004 Property Casualty Insurers Association of America The Alphabet of Federal Legislation Kathleen Jensen Property and Casualty Insurers Association.
1 SAFEGUARDING REGULATIONS AND HOW THEY EFFECT US MICHIGAN ASSOCIATION FOR STUDENT FINANACIAL SERVICE ADMINISTRATORS BY: KAREN REDDICK NATIONAL CREDIT.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
Consumer Privacy & Protection Joanna Acocella May 22, 2007.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Employment Screening: CORI and Private Background Checks Presented by the Massachusetts Law Reform Institute 99 Chauncy St., Suite 500, Boston, MA
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Many Faces of Disclosure
© 2005 West Legal Studies in Business, a division of Thompson Learning. All Rights Reserved.1 PowerPoint Slides to Accompany The Legal, Ethical, and International.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
8/28/2015 The Family Educational Rights and Privacy Act (FERPA)  Also known as the Buckley Amendment.  Statute: 20 U.S.C. 1232g; Regulations: 34 CFR.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Update on Affiliate Sharing Rules April 26, 2007.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Enforcement Action for 2014
Copyright 2007, Integrated Compliance Solutions, LLC FACT Act Red Flags Bank Compliance Association of Connecticut September 3, 2008 Copyright 2007, Integrated.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
FAIR CREDIT REPORTING ACT.  Serves the following principal purposes:  To regulate the consumer-reporting industry.  To prohibit unfair actions from.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Sharing Information With Affiliates and Third Parties F. Jay Meyer Vice President & Senior Counsel TD Bank, N.A. Portland, Maine.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
“FERC-LITE,” WHOLESALE REFUND AUTHORITY, AND RELATED PROVISIONS NOVEMBER 10, 2005 ROBERT R. NORDHAUS VAN NESS FELDMAN WASHINGTON, DC (202)
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 ADMINISTRATIVE LAW AND REGULATORY AGENCIES © 2010 Pearson Education, Inc., publishing as.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
©2013 Morrison & Foerster LLP | All Rights Reserved | mofo.com FTC Update November 13, 2015 Andrew Smith Morrison & Foerster LLP.
The U.S. Securities and Exchange Commission (SEC).
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission,
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
E&O Risk Management: Meeting the Challenge of Change
Citi fraud/identity theft TRAINING
Current Privacy Issues That May Affect Your Credit Union
Enforcement Action for 2014
Information Security Law Update
Individual Rights and Federal Preemption of State Privacy Laws
NCHER 2018 Fall Legal Meeting October 5, 2018
ACI – 17th National Forum on Prepaid Card Compliance
Presentation transcript:

© 2007 Morrison & Foerster LLP All Rights Reserved Privacy and Information Security Monthly Update January 9, 2007 Andrew Smith Tom Scanlon Joyita Basu

2 Outline Legislation Federal: Pretexting, Regulatory Relief State: Social Security number, Security Freeze, and Security Breach Notification Regulation ID Theft Task Force Extension of Telemarketing Sales Rule Moratorium FACT Act Update Litigation Harrington v. ChoicePoint Bell v. Acxiom Enforcement Humana Insurance Co. Consent Order Ameriprise Settlement

3 Legislation: Federal Phone Records Pretexting: H.R. 4709; 18 U.S.C. § Sent to the President January 3, 2007 Criminal violations: False statement to employee or customer Internet access Knowing and intentional sale/transfer or purchase/receipt Without authorization, OR “[H]aving reason to know such information was obtained fraudulently” Compare Gramm-Leach-Bliley Act (“GLBA”): unlawful “to request a person to obtain customer information of a financial institution, knowing that the person will obtain” the information by pretexting. 15 U.S.C. § 6821(b). Aggravated pretexting and enhanced penalties

4 Legislation: Federal Regulatory Relief: Accountants P.L , October 13, 2006 Amends 15 U.S.C. § 6803 Exempts from GLBA initial and annual notice provisions: Certified public accountants who are Certified or licensed by a State; and Subject to rule of professional conduct or ethics that prohibits disclosure without consent. Compare lawyers: 430 F.3d 457 (D.C. Cir. 2005) Narrower: Attorneys “engaged in the practice of law.” Broader: GLBA Safeguards; third-party disclosure requirements.

5 Legislation: Federal Regulatory Relief: GLBA Privacy Notices Federal banking agencies and Federal Trade Commission (“FTC”) must “jointly develop a model form.” Among other factors, model form must “enable consumers easily to identify the sharing practices of a financial institution and to compare privacy practices among financial institutions.” Financial institution that uses the model form shall be deemed to be in compliance with the disclosures required under GLBA. Model form must be proposed for comment by April 13, 2007.

6 Legislation: State Social Security Number (“SSN”) Laws Recent Effective Dates: December 26, 2006: Pennsylvania. January 1, 2007: Arkansas, Colorado, and Minnesota. July 1, 2007: Vermont. Recent Legislation: New York. New York Law: Limitations apply to the use of numbers “derived from” a SSN. Pennsylvania Law: Exempts financial institutions (as defined by the GLBA), entities covered by regulation under the Health Insurance Portability and Accountability Act, and entities subject to the Fair Credit Reporting Act (“FCRA”).

7 Legislation: State Security Freeze Laws Recent Effective Dates: January 1, 2007: Hawaii, Illinois, Kansas, New Hampshire, Oklahoma, Rhode Island, and Wisconsin. Recent Legislation: Pennsylvania. Pennsylvania Law: Pennsylvania consumers, as opposed to only victims of identity theft, may block the release of their credit reports. California Ruling U.D. Registry, Inc. v. California, 50 Cal. Rptr. 3d 647: California court of appeals recently held that the state security freeze law was facially constitutional, but the law could not be constitutionally enforced against a consumer reporting agency (“CRA”) that collected credit-related information regarding individuals from public records and the three nationwide CRAs.

8 Legislation: State Security Breach Notification Laws Recent Effective Dates: December 31, 2006: Arizona. January 1, 2007: Hawaii, New Hampshire, Utah, and Vermont. January 31, 2007: Maine, as amended. Recent legislation: Michigan. Effective July 3, Risk-based notification: Notice required unless the entity determines that the breach “has not or is not likely to cause substantial loss or injury to, or result in identity theft with respect to,” one or more residents of the state.

9 Regulation : ID Theft Task Force Executive Order: May 10, 2006; strategic plan Notice issued December 26, 2006; Comments due January 19, Security of consumer data Government use of SSNs; catalog private uses of SSNs; federal laws regarding data security standards and breach notice; business and consumer education. Preventing misuse of data Upcoming authentication workshop. Victim recovery and assistance Law enforcement Sweeps; training; foreign cooperation; federal laws regarding theft of corporate identity; additional aggravated identity theft.

10 Regulation: Extension of TSR Moratorium 71 Fed. Reg. 77,634 (Dec. 27, 2006). FTC extends past January 2, 2007, its policy of forbearing from enforcing the call abandonment provisions of the Telemarketing Sales Rule (“TSR”) against prerecorded calls. “The forbearance policy should remain in effect until the conclusion of the prerecorded call amendment proceeding.” Reasons: Expiration of policy would effectively ban prerecorded calls; HMO reminder calls.

11 Regulation: FACT Act Update Accuracy study Credit scoring study Affiliate sharing study Upcoming rules: Affiliate marketing Red flags Risk-based pricing Furnisher requirements

12 Litigation: Harrington v. ChoicePoint Case No. CV (C.D. Cal., Oct. 11, 2006). Plaintiffs alleged that, as a result of allowing criminals posing as businesses to gain access to ChoicePoint’s data products, ChoicePoint disclosed consumer reports in violation of the FCRA. The court dismissed plaintiffs’ FCRA claims, holding that the data sold to the criminals was not “consumer report” data and therefore not protected under the FCRA. Not a “communication” of information: Most of the named plaintiffs could not produce sufficient evidence that ChoicePoint actually “communicat[ed]” the information, and held that the FCRA requires, “at a minimum, some act of transmission of information from one source to another.” Does not bear on the seven characteristics: Plaintiffs could not produce sufficient evidence showing that the information actually involved in the fraudulent searches bear on a consumer’s creditworthiness or any of the other six factors prescribed by the FCRA. Specifically, the District Court held that “the very basic demographic and identity related information contained in the initial results of [the fraudulent searches] do not meet the content standard for a consumer report envisioned by Congress when it drafted the seven-factor test.”

13 Litigation: Bell v. Acxiom Plaintiff April Bell (“Bell”) filed a class action against Acxiom Corporation (“Acxiom”) in the U.S. District Court for the Eastern District of Arkansas for claims from a breach of security in Bell alleged that Acxiom was negligent and unreasonably intruded on the privacy of the putative class members by failing to protect their personal information. Acxiom moved for dismissal because Bell failed to plead sufficient injury to warrant standing to sue in federal court, and the district court granted Acxiom’s motion. The district court concluded that the receipt of unsolicited and unwanted mail, as alleged, does not constitute actual harm that rises to an injury under Article III. The district court also rejected Bell’s argument that she was injured as a result of an alleged increased risk of identity theft. The district court found that Bell did not allege suffering any concrete damages; rather Bell’s complaint requested “protection against a harm that is speculative.” The Secure Times (Fall/Winter 2006).

14 Enforcement: Humana Consent Order On October 30, 2006, the North Dakota Commissioner of Insurance (“Commissioner”) entered into a consent order with Humana Insurance Company (“Humana”) regarding two security breaches suffered by Humana in the summer of 2006 (“Consent Order”). The Consent Order described one incident of a theft of a laptop computer containing Humana’s customer information and another involving the discovery of a file of Humana’s customer information on a computer in a hotel. The Commissioner asserted that “allowing a non-affiliated entity access to” Humana’s customer information constituted a “disclosure” of that information under the Commissioner’s privacy regulations under the GLBA that apply to state-licensed insurance entities. However, the Consent Order was silent with respect to whether Humana’s information security program failed to satisfy the Commissioner’s information security program rules under the GLBA. The Consent Order effectively charges Humana with violating its own privacy policy and the state’s privacy rules—by “allowing a non-affiliated entity access to” customer information without regard to whether those customers had opted out under Humana’s policy.

15 Enforcement: Ameriprise Settlement On December 11, 2006, the Massachusetts securities Division entered into a “Memorandum of Understanding” (“MOU”) with Ameriprise Financial Services, Inc. (“Ameriprise”) in connection with a security breach involving a stolen laptop. MOU requires Ameriprise to audit its security controls for the use of laptop computers in home offices, including “notification procedures,” among other sanctions. Massachusetts has not enacted a security breach notification law. Under Securities and Exchange Commission Regulation S-P, investment advisors are not specifically required to notify customers about a breach of security.

16 Speakers Andrew M. Smith Andrew M. Smith is Of Counsel at Morrison & Foerster in Washington, D.C. Mr. Smith advises lenders and other financial services clients on financial privacy issues; consumer financial services issues; and state and federal laws prohibiting unfair and deceptive trade practices. Prior to joining Morrison & Foerster, Mr. Smith was at the FTC, where he directed numerous rulemaking proceedings governing, among other things, the obligations of businesses with respect to identity theft victims, the use of prescreened solicitations, the proper disposal of consumer information, and the sharing of information among affiliated companies. Mr. Smith also supervised the drafting and publication of several FTC studies of the credit reporting industry. Before his stint at the FTC, Mr. Smith was in private practice in Washington, D.C., counseling businesses on consumer financial services issues and representing clients before federal regulatory agencies and in the federal courts. Mr. Smith also served as a staff attorney and Acting Assistant General Counsel at the Securities and Exchange Commission. Mr. Smith can be contacted at or by phone: (202)

17 Bios Tom Scanlon Tom Scanlon is an associate in the Washington, D.C. office of Morrison & Foerster. Mr. Scanlon’s practice focuses on regulatory matters related to managing information about consumers, such as compliance with the FCRA, the privacy and security requirements under the GLBA, and the customer identification requirements under the USA PATRIOT Act. His practice also includes other matters involving financial products and services, including payment transactions in electronic commerce. Mr. Scanlon can be contacted at or by phone: (202)

18 Bios Joyita Basu Joyita Basu is an associate in the Washington D.C. office of Morrison & Foerster. Ms. Basu’s practice focuses on a broad range of matters involving regulatory and legislative issues for financial institutions, including financial products and services under the National Bank Act and electronic banking and payment system issues. Ms. Basu’s practice also includes matters related to privacy and data security under the GLBA, the FCRA, and the FACT Act, as well as state and federal laws prohibiting unfair and deceptive trade practices. Ms. Basu can be contacted at or by phone: (202)