IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.

Slides:



Advertisements
Similar presentations
The United States, Privacy, and Data Protection Peter P. Swire Dutch Embassy Presentation January 19, 2001.
Advertisements

Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
Reflections on the White House Privacy Office Peter P. Swire U.S. Chief Counselor for Privacy, OSU College of Law, 2001-present CFP, March 8,
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
Online Profiling and Consumer Choice Peter P. Swire Center for American Progress Ohio State University ATL Hill Briefing April 28, 2008.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
Consumer Privacy and Information Access Professor Matt Thatcher.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
The Internet industry’s privacy seal program Silicon Valley Web Guild.
Can the US Meet International Privacy Standards in an Era of Personal Health Records, Consumer Scores and Watch Lists? UNSW's Cyberspace Law and Policy.
Mckennalong.com Center for Policy on Emerging Technology Dan Caprio, Senior Strategic Advisor, McKenna.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Working group discussion 1 Cyber Risk Security, Privacy ?
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 6. Ensuring Privacy AICPA-CPA Canada Privacy Definition “the rights and obligations of individuals.
Data Privacy Day 2012 on Campus Jolynn Dellinger Program Manager, Data Privacy Day National Cyber Security Alliance.
“Privacy Institutions in the Federal Government” Professor Peter Swire Ohio State University Center for American Progress Silicon Flatirons February 14,
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Name of presenter(s) or subtitle Privacy laws and their impact on research David W. Stark MRIA B.C. Chapter November 2, 2005.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Wireless Password:  “The cloud” is real  Electronic data growth is rapid and pervasive  Employees use the cloud to conduct government work.
Privacy Hot Topics Discussion August 18, 2011 The Corporate Privacy Forum Sharing practical solutions to today’s privacy challenges 1.
Where Did HIPAA Come From? “HIPAA Then and Now” Peter Swire Georgia Tech Scheller College of Business Alston & Bird LLP IAPP-Las Vegas 2015.
The Impact of Privacy on HP’s Customer Relationship Management Solution Mike Overly Vice President, Marketing © 2003 Hewlett-Packard Development Company,
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Recent Privacy Developments ISACA January 12, 2012 Keith A. Cheresko and Robert L. Rothman Principals, Privacy Associates International LLC.
Direct from Washington: The Impact of Federal Legislation on Direct & Interactive Marketers.
The Internet of Things and Consumer Protection
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Introduction to our reality
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Government Agencies. State Department 1789 French Revolution caused us to think about having an agency that deals with other countries Secretary of State.
Key Points for a Privacy Programme for Multinationals Steve Coope.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
COMMUNICATING AND MARKETING ONLINE: THE FUTURE PROSPECTS By Scott Duffy.
Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Peter Swire Holder Chair of Law and Ethics
Information Security Program
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
2017 global president Frank Simpson Del Markward SIOR.
What Does It Mean To Be A Privacy Professional?
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Governance, Risk Management & Compliance (GRC) Market Share, Segmentation, Report 2024
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Automotive Cybersecurity Market to reach $837.1mn by 2024: Global Market.
Regulation and Digital Rights: The Big Picture
"Security and Privacy After September 11: The Healthcare Example”
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
Upcoming PIPEDA Changes
Expanding the OSI Stack to Describe Categories of Privacy Tasks
Expanding the OSI Stack to Describe Categories of Privacy Tasks: The Privacy Institutions Risk Management Framework Professor Peter Swire Georgia Tech.
Presentation transcript:

IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior Counsel, Alston & Bird Huang Professor of Law and Ethics Georgia Tech Scheller College of Business April 29, 2015

2 Overview  First Wave of Global Privacy Protection – 1990’s  Post 9/11  Second Wave  Responses from post 9/11 period do not handle the risks and realities in privacy and cyber today

3 First Wave  1993 – commercial activity on Internet  The First Wave  EU Directive in effect (1998); Safe Harbor (2000)  HIPAA (rules )  GLBA (law 1999)  Children’s Online Privacy Protection Act (1998)  Privacy policies and FTC rise to prominence for Internet privacy

4 Post 9/11 – Privacy slowdown  Security vs. privacy  Connect the dots  From “need to know” to “need to share”  Patriot Act 2001 (compare to 2000 proposal)  PNRs as US/EU focus – sharing more data  Self-regulatory efforts decline  FTC focus on “harm” only  Corporate focus primarily on the privacy policy

5 Post-9/11 (continued)  Meanwhile  Institutionalization of the CPO role  Safe Harbor adoption  While US did little  Canada, Mexico & steady stream of others led to over 100 countries with comprehensive laws by 2012 …

Privacy Laws Comprehensive Law Sectoral Law

7 Compare 2012 with 1998 Privacy Laws Comprehensive Law Sectoral Law

8 The Second Wave: Public Attention to Privacy and Cyber  Like the 90’s, press stories very prominent on privacy and cyber  See the IAPP Daily Dashboard – it’s long every day (11)  Press and private sector  WSJ and “what they know” series  Growth industry for privacy, data breach, cyber reporters

9 The Second Wave – New Technologies Social networks Facebook not open to the public til 2006 Mobile and smartphones Location; new customer data for many Online behavioral advertising Huge slump after dot.com crash Today, central to many business strategies Cloud Government access (Snowden) Cyber-security/encryption/information sharing

10 EU as a Driver (Again)  Coming soon: General EU Data Protection Regulation  Right to be Forgotten  2% of global revenues  Expanded jurisdiction  Expanding DPA enforcement/activity  Coming changes to Safe Harbor  And, it’s not just the EU  Global companies need a global strategy

11 Second Wave: The Snowden Effect  Press and government surveillance (Snowden)  Creates atmosphere for possible change  Competitive issue for US companies abroad  One response was President Obama’s Review Group on Intelligence & Communications Technology  46 recommendations in 300 page report  Surprisingly many have been adopted  USA Freedom Act introduced yesterday by bipartisan group in Senate would do more

12 December 2013: The Situation Room

13 Second Wave: US Government Activity  Obama administration  Information sharing bills just passed the House  Data breach being seriously considered this year  New bill language for Consumer Privacy Bill of Rights  Student privacy (K-12): bipartisan  FTC: far beyond 2005 view of “harm”  Consent decrees in privacy: “comprehensive” programs  So many issues/workshops: OBA/DNT, Big Data (discrimination), IoT, data brokers, cross-device tracking  Cyber security (along with many other federal agencies)  Congress  Info sharing, data breach, drones, IoT, Big Data, wearable health devices, FISA, ECPA …

14 Second Wave: The Private Sector  Self-regulation is back  Student privacy; online advertising; smart grid; mobile notices; beacons and retailers; connected cars; drones; IoT  CPO – far beyond drafting privacy policy & compliance  Benefits of data – monetization strategy  Cyber – big data and risk of big data breach  Your company’s data strategy  Compliance with current rules  Compliance with what is coming  Insight about where to position your company  Ethics, training beyond compliance

15 Conclusion  A lot happened in the first wave of global privacy protection  With 9/11, less privacy change  But the second wave is on us now  Organizations need a strategy to manage their data for business goals, consistent with both privacy and security