ICLG
The International Comparative Legal Guide to:
Data Protection 2016
3rd Edition
A practical cross-border insight into data protection law
Published by Global Legal Group, with contributions from:
Affärsadvokaterna i Sverige AB
Bagus Enrico & Partners
Cuatrecasas, Gonçalves Pereira
Deloitte Albania Sh.p.k.
Dittmar & Indrenius
ECIJA ABOGADOS
Eversheds SA
Gilbert + Tobin
GRATA International Law Firm
Hamdan AlShamsi Lawyers & Legal Consultants
Herbst Kinsky Rechtsanwälte GmbH
Hogan Lovells BSTL, S.C.
Hunton & Williams
Lee and Li, Attorneys-at-Law
Matheson
Mori Hamada & Matsumoto
Osler, Hoskin & Harcourt LLP
Pachiu & Associates
Pestalozzi
Rossi Asociados
Subramaniam & Associates (SNA)
Wigley & Company
Wikborg, Rein & Co. Advokatfirma DA
. The International Comparative Legal Guide to: Data Protection 2016
General Chapter:
1
Contributing Editor
Bridget Treacy,
Hunton & Williams
Sales Director
Florjan Osmani
Account Directors
Oliver Smith, Rory Smith
Sales Support Manager
Toni Hayward
Sub Editor
Hannah Yip
Preparing for Change: Europe’s Data Protection Reforms Now a Reality –
Bridget Treacy, Hunton & Williams
1
Country Question and Answer Chapters:
2
Albania
Deloitte Albania Sh.p.k.: Sabina Lalaj & Ened Topi
3
Australia
Gilbert + Tobin: Peter Leonard & Althea Carbon
4
Austria
Herbst Kinsky Rechtsanwälte GmbH: Dr. Sonja Hebenstreit &
Dr. Isabel Funk-Leisch
30
5
Belgium
Hunton & Williams: Wim Nauwelaerts & David Dumont
41
6
Canada
Osler, Hoskin & Harcourt LLP: Adam Kardash & Bridget McIlveen
50
7
15
7
Chile
Rossi Asociados: Claudia Rossi
60
Senior Editor
Rachel Williams
8
China
Hunton & Williams: Manuel E. Maisog & Judy Li
67
Chief Operating Officer
Dror Levy
9
Finland
Dittmar & Indrenius: Jukka Lång & Iiris Keino
74
Group Consulting Editor
Alan Falach
10 France
Hunton & Williams: Claire François
83
11 Germany
Hunton & Williams: Anna Pateraki
92
12 India
Subramaniam & Associates (SNA): Hari Subramaniam &
Aditi Subramaniam
104
13 Indonesia
Bagus Enrico & Partners: Enrico Iskandar & Bimo Harimahesa
116
14 Ireland
Matheson: Anne-Marie Bohan & Andreas Carney
123
15 Japan
Mori Hamada & Matsumoto: Akira Marumo & Hiromi Hayashi
135
16 Kazakhstan
GRATA International Law Firm: Leila Makhmetova & Saule Akhmetova
146
17 Mexico
Hogan Lovells BSTL, S.C.: Mario Jorge Yáñez V.
&
Federico de Noriega Olea
155
18 New Zealand
Wigley & Company: Michael Wigley
19 Norway
Wikborg, Rein & Co. Advokatfirma DA: Dr. Rolf Riisnæs &
Dr.
Emily M. Weitzenboeck
171
20 Portugal
Cuatrecasas, Gonçalves Pereira: Leonor Chastre
182
21 Romania
Pachiu & Associates: Mihaela Cracea & Ioana Iovanesc
193
22 Russia
GRATA International Law Firm: Yana Dianova, LL.M.
204
23 South Africa
Eversheds SA: Tanya Waksman
217
24 Spain
ECIJA ABOGADOS: Carlos Pérez Sanz & Lorena Gallego-Nicasio Peláez 225
25 Sweden
Affärsadvokaterna i Sverige AB: Mattias Lindberg
235
26 Switzerland
Pestalozzi: Clara-Ann Gordon & Phillip Schmidt
244
27 Taiwan
Lee and Li, Attorneys-at-Law: Ken-Ying Tseng & Rebecca Hsiao
254
28 United Arab Emirates
Hamdan AlShamsi Lawyers & Legal Consultants: Dr. Ghandy Abuhawash 263
29 United Kingdom
Hunton & Williams: Bridget Treacy & Stephanie Iyayi
271
30 USA
Hunton & Williams: Aaron P.
Simpson & Chris D. Hydak
280
Group Publisher
Richard Firth
Published by
Global Legal Group Ltd.
59 Tanner Street
London SE1 3PL, UK
Tel: +44 20 7367 0720
Fax: +44 20 7407 5255
Email: info@glgroup.co.uk
URL: www.glgroup.co.uk
GLG Cover Design
F&F Studio Design
GLG Cover Image Source
iStockphoto
Printed by
Ashford Colour Press Ltd.
April 2016
Copyright © 2016
Global Legal Group Ltd.
All rights reserved
No photocopying
ISBN 978-1-910083-93-2
ISSN 2054-3786
Strategic Partners
164
Further copies of this book and others in the series can be ordered from the publisher. Please call +44 20 7367 0720
Disclaimer
This publication is for general information purposes only.
It does not purport to provide comprehensive full legal or other advice.
Global Legal Group Ltd. and the contributors accept no responsibility for losses that may arise from reliance upon information contained in this publication.
This publication is intended to give an indication of legal issues upon which you may need advice. Full legal advice should be taken from a qualified
professional when dealing with specific situations.
WWW.ICLG.CO.UK
.
Chapter 30
USA
Aaron P. Simpson
Hunton & Williams
1 Relevant Legislation and Competent
Authorities
1.1
Chris D. Hydak
Bureau, the Department of Health and Human Services (“HHS”)
and the 50 state Attorneys General.
2 Definitions
What is the principal data protection legislation?
1.2
Is there any other general legislation that impacts
data protection?
Section 5 of the Federal Trade Commission Act prohibits “unfair or
deceptive acts or practices in or affecting commerce”. The Federal
Trade Commission (“FTC”) has brought several enforcement
actions under Section 5 of the FTC Act related to data processing
practices which it considers unfair or deceptive.
1.3
Is there any sector specific legislation that impacts
data protection?
Yes, there are several sector specific laws that impact data protection.
For example, the Health Insurance Portability and Accountability Act
of 1996 (“HIPAA”) applies to protected health information and the
Gramm-Leach-Bliley Act (“GLB”) applies to financial institutions
and “nonpublic personal information.” Below are additional
examples of federal sector specific laws that impact data protection:
â–
The Children’s Online Privacy Protection Act (“COPPA”)
regulates the online collection and processing of the personal
data of children under the age of 13.
â–
The Telecommunications Act regulates telecommunications
carriers’ use of customer information.
â–
The Fair Credit Reporting Act (“FCRA”) and the Fair and
Accurate Credit Transactions Act govern data protection in
the consumer reporting industry.
â–
1.4
The Video Privacy Protection Act restricts certain entities
from processing personal data that identifies a consumer
as having requested or obtained specific video materials or
services.
What is the relevant data protection regulatory
authority(ies)?
There are a number of regulatory authorities with respect to data
protection, including the FTC, the Consumer Financial Protection
280
WWW.ICLG.CO.UK
2.1
Please provide the key definitions used in the relevant
legislation:
â–
“Personal Data”
There is no overarching definition of “personal data” under
relevant U.S.
laws. Each law has its own definition of
personal data.
â–
“Sensitive Personal Data”
U.S. laws generally do not define “sensitive personal
data”.
Certain U.S. laws, however, do provide heightened
requirements for certain elements of personal data. For
example, many state laws restrict an entity’s ability to
process Social Security numbers.
State laws often impose
notification requirements when there are security breaches
involving certain data elements deemed sensitive.
â–
“Processing”
There is no comprehensive, consolidated data protection law in the
U.S. Data protection in the U.S. is primarily regulated through a
number of (i) sector specific federal laws, and (ii) state laws.
Relevant U.S.
laws generally do not define “processing”, but
in practice processing typically includes collection, usage,
storage, disclosure and disposal.
â–
“Data Controller”
Relevant U.S. laws do not define “data controller”. There
are similar concepts under certain U.S.
laws, however. For
example, U.S. state breach notification laws often include the
concept of “data owners”, which are typically entities that
own or license the pertinent information.
â–
“Data Processor”
Relevant U.S.
laws do not define “data processor”. Similar to
“data controller”, however, there are similar concepts under
certain U.S. laws.
â–
“Data Subject”
Relevant U.S.
laws do not define “data subject”.
â–
Other key definitions – please specify (e.g., “Pseudonymous
Data”, “Direct Personal Data”, “Indirect Personal Data”)
â– “Pseudonymous Data”
Relevant U.S. laws do not define “pseudonymous data”.
â– “Direct Personal Data”
Relevant U.S. laws do not define “direct personal data”.
â– “Indirect Personal Data”
Relevant U.S.
laws do not define “indirect personal data”.
© Published and reproduced with kind permission by Global Legal Group Ltd, London
ICLG TO: DATA PROTECTION 2016
. Hunton & Williams
USA
â–
Correction and deletion
U.S. laws generally do not provide individuals with a right to
correct or delete their data. Certain U.S. laws (e.g., FCRA),
however, do grant individuals the right to dispute incomplete
or inaccurate information and impose a duty on certain
entities to correct the inaccurate or incomplete information.
â–
Objection to processing
U.S.
laws generally do not provide individuals with a right to
object to the processing of their data.
â–
Objection to marketing
Many sector specific U.S. laws allow individuals to object to
being contacted for marketing purposes. For example, the
Controlling the Assault of Non-Solicited Pornography and
Marketing Act of 2003 (“CAN-SPAM”) requires that entities
sending marketing or promotional emails to consumers
provide a mechanism for consumers to opt out from future
marketing or promotional emails.
Certain U.S.
laws (e.g., state breach notification laws)
refer to data owners. Typically, these are entities that own
or license the relevant information (i.e., not data subjects
or service providers).
3 Key Principles
3.1
What are the key principles that apply to the
processing of personal data?
â–
Transparency
There are no overarching principles derived from law for
processing personal data. Certain U.S.
laws require entities to
provide notice when they collect or process certain data. For
example, two state laws (i.e., the California Online Privacy
Protection Act (“CalOPPA”) and the Delaware Online and
Personal Privacy Protection Act (“DOPPPA”)) require
operators of websites and mobile apps to include a notice
detailing certain of their information processing practices for
data collected through the website or mobile app.
â–
Complaint to relevant data protection authority(ies)
â–
Lawful basis for processing
U.S. consumers may report violations of relevant privacy
laws to government regulators, such as the FTC and state
Attorneys General, but there are no data protection-specific
regulators in the U.S.
at this time.
There is no overarching requirement to have a lawful basis
to process personal data. U.S. laws do, however, restrict
an entity’s ability to process personal data in certain
circumstances.
For example, certain state laws restrict
retailers from collecting or processing personal data at the
point-of-sale when a customer purchases merchandise with a
payment card.
â–
Other key rights – please specify
USA
â– “Data Owner”
There are no other key rights in particular.
â–
Purpose limitation
There is no overarching principle regarding purpose
limitation but certain U.S. laws do require entities to notify
individuals of the purposes for which they may collect and
process their personal data. In addition, the FTC regularly
brings enforcement actions against companies that materially
deviate from the purposes for which they collected the
information (as articulated in their privacy notice).
â–
Data minimisation
While there is no overarching principle regarding data
minimisation, the FTC has recommended that companies
adhere to the principle by only collecting data needed for a
specific purpose.
5 Registration Formalities and Prior
Approval
5.1
In what circumstances is registration or notification
required to the relevant data protection regulatory
authority(ies)? (E.g., general notification requirement,
notification required for specific processing
activities.)
There are no circumstances in which an organisation has to register
or notify a data protection authority prior to the general processing
of personal data.
There are notification requirements with respect to
data breaches, as discussed in section 13.
5.2
On what basis are registrations/notifications made?
(E.g., per legal entity, per processing purpose, per
data category, per system or database.)
â–
Proportionality
There is no overarching principle regarding proportionality.
â–
Retention
This is not applicable.
There are over 13,000 records retention laws at the state and
federal level in the U.S. These laws generally are not specific
to personal data but are important to comply with in order to
appropriately safeguard records containing personal data.
5.3
â–
Other key principles – please specify
There are no other key principles in particular.
4 Individual Rights
4.1
What are the key rights that individuals have in
relation to the processing of their personal data?
â–
Access to data
U.S. laws generally do not provide individuals with a right to
access their data.
Certain U.S. laws (e.g., HIPAA), however,
do provide individuals with access rights.
Who must register with/notify the relevant data
protection authority(ies)? (E.g., local legal entities,
foreign legal entities subject to the relevant data
protection legislation, representative or branch offices
of foreign legal entities subject to the relevant data
protection legislation.)
This is not applicable.
5.4
What information must be included in the registration/
notification? (E.g., details of the notifying entity,
affected categories of individuals, affected categories
of personal data, processing purposes.)
This is not applicable.
ICLG TO: DATA PROTECTION 2016
© Published and reproduced with kind permission by Global Legal Group Ltd, London
WWW.ICLG.CO.UK
281
. Hunton & Williams
5.5
What are the sanctions for failure to register/notify
where required?
This is not applicable.
USA
5.6
How frequently must registrations/notifications be
renewed (if applicable)?
This is not applicable.
5.8
For what types of processing activities is prior
approval required from the data protection regulator?
This is not applicable.
5.9
7 Marketing and Cookies
7.1
What is the fee per registration (if applicable)?
This is not applicable.
5.7
USA
Describe the procedure for obtaining prior approval,
and the applicable timeframe.
Please describe any legislative restrictions on the
sending of marketing communications by post,
telephone, email, or SMS text message. (E.g.,
requirement to obtain prior opt-in consent or to
provide a simple and free means of opt-out.)
Post – This is not applicable.
Telephone and SMS text message – Among other relevant laws,
the Telephone Consumer Protection Act (“TCPA”) requires that
entities obtain the “prior express written consent” of a consumer
before marketing to him or her via a telephone call or SMS text
message to a mobile phone sent using auto dialling equipment or
a prerecorded or artificial voice. The TCPA also requires “prior
express written consent” for calls to residential lines using an
artificial or prerecorded voice.
Email – CAN-SPAM requires entities marketing via email to
provide consumers with a clear and conspicuous mechanism for
opting out of future marketing emails.
7.2
Is the relevant data protection authority(ies) active in
enforcement of breaches of marketing restrictions?
This is not applicable.
6 Appointment of a Data Protection Officer
6.1
Is the appointment of a Data Protection Officer
mandatory or optional?
There is no U.S. law with respect to appointing a Data Protection
Officer.
“Covered entities” under HIPAA, however, must appoint
a privacy officer.
6.2
What are the sanctions for failing to appoint a
mandatory Data Protection Officer where required?
The FTC is active in enforcing violations of the Telemarketing
Sales Rule (“TSR”), which is similar to the TCPA in that it requires
prior consumer consent for telemarketing calls. In addition, the
Federal Communications Commission (“FCC”) is somewhat
active in enforcing the TCPA but, as the TCPA contains a private
right of action, the vast majority of TCPA litigation is initiated by
private plaintiffs, not the FCC. Accordingly, entities that conduct
telemarketing are generally more concerned with the TCPA than the
TSR because the TCPA (i) provides aggrieved consumers with a
private right of action, and (ii) is broader in scope than the TSR.
The
FTC also is active in enforcing against companies that use personal
data, including with respect to marketing, in ways that materially
deviate from representations they have made in public.
This is not applicable.
7.3
6.3
Generally, telemarketers are required to screen against the national
do-not-call registry.
What are the advantages of voluntarily appointing a
Data Protection Officer (if applicable)?
This is not applicable.
6.4
Please describe any specific qualifications for the
Data Protection Officer required by law.
This is not applicable.
6.5
What are the responsibilities of the Data Protection
Officer, as required by law or typical in practice?
This is not applicable.
6.6
7.4
Must the appointment of a Data Protection Officer
be registered/notified to the relevant data protection
authority(ies)?
Are companies required to screen against any “do not
contact” list or registry?
What are the maximum penalties for sending
marketing communications in breach of applicable
restrictions?
Each email that violates CAN-SPAM is subject to a maximum
penalty of $16,000. Each telephone call or text message that
violates the TCPA is subject to a maximum penalty of $1,500.
7.5
What types of cookies require explicit opt-in consent,
as mandated by law or binding guidance issued by
the relevant data protection authority(ies)?
No type of cookies requires opt-in consent.
This is not applicable.
282
WWW.ICLG.CO.UK
© Published and reproduced with kind permission by Global Legal Group Ltd, London
ICLG TO: DATA PROTECTION 2016
.
Hunton & Williams
For what types of cookies is implied consent
acceptable, under relevant national legislation
or binding guidance issued by the relevant data
protection authority(ies)?
There is no U.S. law specifically addressing consent to cookies.
CalOPPA and DOPPPA do require, in certain circumstances, operators
of commercial websites and online services that collect personal data
to disclose (i) how the operator responds to “do not track” signals
from web browsers, and (ii) whether third parties on the operator’s
website or online service may collect personal data about users’
online activities over time and across third-party websites.
7.7
To date, has the relevant data protection authority(ies)
taken any enforcement action in relation to cookies?
The FTC has brought enforcement actions related an entity’s
information processing practices that included cookie use. For
example, the FTC has brought enforcement actions against
companies alleged to have violated COPPA or Section 5 of the FTC
Act through, in part, their use of cookies.
complaint notification system for the receipt of complaints related
to accounting, internal accounting controls or auditing matters.
SOX also provides protections to restrict retaliatory actions against
whistle-blowers. There are no limitations, however, imposed by
data protection or other laws on the scope of whistle-blower hotlines
with respect to (i) issues that may be reported, (ii) the persons who
may submit a report, or (iii) the persons whom a report may concern.
9.2
Is anonymous reporting strictly prohibited, or
strongly discouraged, under applicable law or binding
guidance issued by the relevant data protection
authority(ies)? If so, how do companies typically
address this issue?
USA
7.6
USA
This is not applicable.
9.3
Do corporate whistle-blower hotlines require separate
registration/notification or prior approval from the
relevant data protection authority(ies)? Please explain
the process, how long it typically takes, and any
available exemptions.
This is not applicable.
7.8
What are the maximum penalties for breaches of
applicable cookie restrictions?
9.4
There is no U.S.
law that specifically addresses cookies.
Do corporate whistle-blower hotlines require a
separate privacy notice?
This is not applicable.
8 Restrictions on International Data
Transfers
8.1
Please describe any restrictions on the transfer of
personal data abroad?
There are no restrictions on cross-border transfers of personal data.
8.2
Please describe the mechanisms companies typically
utilise to transfer personal data abroad in compliance
with applicable transfer restrictions.
This is not applicable.
8.3
Do transfers of personal data abroad require
registration/notification or prior approval from the
relevant data protection authority(ies)? Describe
which mechanisms require approval or notification,
what those steps involve, and how long they take.
This is not applicable.
9 Whistle-blower Hotlines
9.1
What is the permitted scope of corporate whistleblower hotlines under applicable law or binding
guidance issued by the relevant data protection
authority(ies)? (E.g., restrictions on the scope of
issues that may be reported, the persons who may
submit a report, the persons whom a report may
concern.)
The Sarbanes-Oxley Act (“SOX”) requires publicly listed
companies to implement a whistle-blowing hotline or other
9.5
To what extent do works councils/trade unions/
employee representatives need to be notified or
consulted?
If a workforce is unionised, the trade union would need to be
notified or consulted only if the agreement between the union and
the employer requires notification or consultation, which is unlikely.
10 CCTV and Employee Monitoring
10.1 Does the use of CCTV require separate registration/
notification or prior approval from the relevant data
protection authority(ies)?
No, it does not.
10.2 What types of employee monitoring are permitted (if
any), and in what circumstances?
All types of employee monitoring (e.g., monitoring phone calls,
computer use, email use, etc.) are permitted if the monitoring is for
a legitimate business purpose. In addition, employee monitoring
without a legitimate business purpose may be permitted in certain
circumstances (e.g., with notice and consent). However, certain
monitoring activities that would be highly offensive, such as using
CCTV in the employee lavatory, are generally not permitted.
10.3 Is consent or notice required? Describe how
employers typically obtain consent or provide notice.
Certain U.S.
laws require employers to provide notice of electronic
employee monitoring. Neither notice for other forms of monitoring
nor consent is strictly required to monitor employees for a legitimate
ICLG TO: DATA PROTECTION 2016
© Published and reproduced with kind permission by Global Legal Group Ltd, London
WWW.ICLG.CO.UK
283
. Hunton & Williams
USA
business purpose. Many employers in the U.S., however, provide
notice and obtain consent to their monitoring practices to help ensure
that data subjects clearly understand that monitoring is occurring.
Notice and consent is typically obtained via an employee policy
(e.g., an Acceptable Use Policy or specific monitoring policy) and/
or a network login banner.
10.4 To what extent do works councils/trade unions/
employee representatives need to be notified or
consulted?
There is no data protection requirement to notify or consult with
works councils, trade unions or employee representatives.
10.5 Does employee monitoring require separate
registration/notification or prior approval from the
relevant data protection authority(ies)?
No, it does not.
11 Processing Data in the Cloud
11.1 Is it permitted to process personal data in the cloud?
If so, what specific due diligence must be performed,
under applicable law or binding guidance issued by
the relevant data protection authority(ies)?
Yes, processing personal data in the cloud is permitted. There are no
specific laws regarding processing personal data in the cloud.
11.2 What specific contractual obligations must be
imposed on a processor providing cloud-based
services, under applicable law or binding guidance
issued by the relevant data protection authority(ies)?
This is not applicable.
12 Big Data and Analytics
12.1 Is the utilisation of big data and analytics permitted?
If so, what due diligence is required, under applicable
law or binding guidance issued by the relevant data
protection authority(ies)?
Yes, it is permitted. There is no specific diligence required under
applicable law or binding guidance to use big data and analytics in
the U.S.
13 Data Security and Data Breach
13.1 What data security standards (e.g., encryption) are
required, under applicable law or binding guidance
issued by the relevant data protection authority(ies)?
There are no overarching data security standards imposed by U.S.
law.
Certain sector specific federal laws impose data security
requirements on particular entities. For example, GLB requires
financial institutions to implement an information security
programme, and regularly monitor and test the information
security programme. HIPAA requires covered entities and business
284
WWW.ICLG.CO.UK
USA
associates to take specific steps to safeguard electronically protected
health information, including the implementation of administrative,
physical and technical safeguards.
In addition, some U.S. states have
enacted laws imposing minimum information security requirements
on entities that process information about a resident of those states.
The most stringent of these state laws is the Massachusetts law,
which requires, among other items, that applicable organisations
develop, implement and maintain a comprehensive and written
information security programme. The Massachusetts law requires
the encryption of (i) files containing personal data that are transmitted
across public networks, and (ii) data containing personal data that is
transmitted wirelessly.
13.2 Is there a legal requirement to report data breaches
to the relevant data protection authority(ies)? If so,
describe what details must be reported, to whom, and
within what timeframe.
If no legal requirement exists,
describe under what circumstances the relevant data
protection authority(ies) expects voluntary breach
reporting.
Yes, there is a legal requirement to report data breaches to certain
data protection authorities. Approximately 20 states require entities
to report data breaches to the relevant state regulator, such as the
Attorney General. The exact requirements regarding the details and
timeframe vary among the state laws.
Most states do not include a
requirement to provide notification within a prescribed timeframe,
but some do. For example, Puerto Rico’s breach notification law
requires notice to the relevant regulator within 10 days after the
incident has been detected and Vermont’s law requires a preliminary
notice within 14 business days of the date of discovery. The
requirements regarding the content of the notice to government
regulators vary, but generally include a description of the breach,
the types of information impacted and what the entity has done to
mitigate risk to affected individuals.
In addition, certain sector specific federal laws require entities to
notify regulators in the event of a data breach.
For example, the
Interagency Guidance on Response Programs for Unauthorized
Access to Customer Information and Customer Notice requires
financial institutions to notify their primary federal regulator. The
Health Information Technology for Economic and Clinical Health
(“HITECH”) Act requires entities to notify HHS immediately
for breaches that affect the protected health information of more
than 500 individuals. Breaches that affect the protected health
information of fewer than 500 individuals must be reported to HHS
annually.
HHS provides an electronic form for entities to report
breaches. The form requests information such as a description of
the breach and the subsequent actions taken by the entity to respond
to the breach.
13.3 Is there a legal requirement to report data breaches
to individuals? If so, describe what details must
be reported, to whom, and within what timeframe.
If no legal requirement exists, describe under
what circumstances the relevant data protection
authority(ies) expects voluntary breach reporting.
Forty-seven U.S. states, the District of Columbia, Guam, Puerto Rico
and the U.S.
Virgin Islands have enacted data breach notification
statutes requiring entities to notify affected individuals in the event
of a data breach. The laws vary but generally require notification to
affected individuals in the most expedient time possible and without
unreasonable delay. Some state laws, however, require notification
within a prescribed timeframe (e.g., 30 days in Florida).
The
content requirements regarding what information must be contained
© Published and reproduced with kind permission by Global Legal Group Ltd, London
ICLG TO: DATA PROTECTION 2016
. Hunton & Williams
13.4 What are the maximum penalties for security
breaches?
There are no penalties simply for suffering a data breach. There
can be penalties, however, if a breached company did not or does
not comply with relevant federal or state data breach notification
statutes, information security statutes or other applicable laws.
In addition, there can be penalties associated with a breach if
a company was negligent, reckless, made deceptive comments
about its information security practices or its information security
practices were lax enough to be deemed “unfair”.
Penalties can include enforcement actions from government
regulators and class action lawsuits initiated by impacted individuals.
The maximum penalties depend on the law at issue.
14 Enforcement and Sanctions
14.1 Describe the enforcement powers of the data
protection authority(ies):
The data protection authorities have wide-ranging enforcement powers,
including the authority to issue civil investigative demands, subpoenas
and generally investigate a company’s information processing
practices. Additionally, the enforcement authorities can impose
sanctions, such as monetary penalties, and affirmative obligations,
such as a mandate to implement a comprehensive information security
programme, submit to independent audits and submit compliance
reports on a regular basis to the relevant data protection authority.
Often the requirement to implement a comprehensive information
security programme includes monitoring by the authority for a lengthy
period (e.g., 20 years).
14.2 Describe the data protection authority’s approach
to exercising those powers, with examples of recent
cases.
There are numerous regulators with authority to bring actions related
to data protection and they do not follow a common approach. The
FTC is the most active federal regulator in the data protection arena.
A recent federal court decision related to an FTC enforcement
action against a large hotel chain regarding the hotel chain’s
information security practices buttressed the FTC’s authority to
bring enforcement actions related to information security standards
and practices.
As a result of the decision, the FTC (and potentially
other government regulators) may be more emboldened to bring
future actions related to information security and data protection.
15 E-discovery / Disclosure to Foreign
Law Enforcement Agencies
15.1 How do companies within your jurisdiction respond
to foreign e-discovery requests, or requests for
disclosure from foreign law enforcement agencies?
There is no particular rule regarding how U.S. companies may
respond to foreign e-discovery requests, or requests for disclosure
from foreign law enforcement agencies.
USA
in the notice to affected individuals vary among the relevant laws.
Generally, however, the state data breach notification laws require
the notice to contain a general description of the incident, the types
of information affected and contact information where affected
individuals may obtain additional information. With respect to
federal laws, the HITECH Act requires notification to affected
individuals within 60 days.
USA
15.2 What guidance has the data protection authority(ies)
issued?
No guidance has been used.
16 Trends and Developments
16.1 What enforcement trends have emerged during the
previous 12 months? Describe any relevant case law.
During the previous 12 months, there have been a few trends with
respect to the enforcement of data protection laws.
For example, it
is becoming rather common, at both the federal and state levels, for
regulators to send organisations that suffered a data breach written
request for information regarding the breach, such as what specific
information security measures the organisation had in place prior to
the breach and what information security measures the organisation
is implementing to correct any vulnerabilities identified as a result
of the breach. Also within the previous 12 months, the FTC has
brought several privacy and data security-related enforcement
actions. For example, the FTC brought and settled enforcement
actions against (i) a technology company that allows retailers to
track consumer movement in-store alleging that the technology
company misrepresented consumers’ ability to opt out of such instore tracking, and (ii) multiple data brokers alleging that the data
brokers failed to provide reasonable security to protect consumer
financial information.
The FTC also recently released a report on
the Internet of Things (“IoT”), which stated that the FTC will use
its enforcement authority to bring actions against entities in the IoT
space that violate laws the FTC has the authority to enforce.
In addition, the FCC has entered the information security arena. In
October 2014, the FCC brought its first enforcement actions related
to information security against two telecommunications carriers for
allegedly failing to adequately safeguard their customers’ personal
data. In November 2015, the FCC settled its first information
security-related enforcement action against a cable provider after
the cable provider was the target of a cyberattack that compromised
the personal data of certain of the provider’s current and former
customers.
ICLG TO: DATA PROTECTION 2016
© Published and reproduced with kind permission by Global Legal Group Ltd, London
WWW.ICLG.CO.UK
285
.
Hunton & Williams
USA
16.2 What “hot topics” are currently a focus for the data
protection regulator?
As described in question 16.1 above, cybersecurity remains a “hot
topic” in the U.S. and is a priority for the Obama administration. In
addition, Congress passed the Cybersecurity Information Sharing
Act (“CISA”), which President Obama signed into law on December
18, 2015. CISA facilitates and encourages the sharing of Internet
traffic information between and among the private sector and the
federal government to prevent cyberattacks.
The mobile ecosystem
and the IoT are “hot topics” as well.
USA
The transfer of personal data from the European Union (“EU”) to
the U.S. became a “hot topic” in October 2015 when the Court of
Justice of the European Union ruled the U.S.-EU Safe Harbour
invalid. Subsequent to the invalidation of Safe Harbour, the U.S.
Department of Commerce and the European Commission reached
agreement on the Privacy Shield, which will (if implemented)
replace Safe Harbour as a valid basis for transferring personal data
from the EU to the U.S.
The European Commission released the
legal texts that will implement the Privacy Shield on February
29, 2016. These legal texts must be approved by the College of
Commissioners before the Privacy Shield is implemented.
Aaron P. Simpson
Chris D.
Hydak
Hunton & Williams
200 Park Avenue
New York, NY 10166
USA
Hunton & Williams
200 Park Avenue
New York, NY 10166
USA
Tel: +1 212 309 1126
Email: asimpson@hunton.com
URL: www.hunton.com
Tel: +1 212 309 1012
Email: chydak@hunton.com
URL: www.hunton.com
Aaron P. Simpson is a partner in the New York office of Hunton &
Williams. He advises clients on a broad range of complex privacy and
cybersecurity matters, including state, federal and international privacy
and data security requirements, and the remediation of large-scale
data security incidents.
He helps clients identify, evaluate and manage
risks associated with their collection and use of information. Aaron is
well-known as a top privacy professional and has been recognised by
Chambers & Partners, New York Super Lawyers, Computerworld and
The Legal 500 for his work on behalf of clients. He is a sought-after
media resource on privacy issues and has been quoted in publications
such as Bloomberg Businessweek Magazine, DataGuidance and
TIME Magazine.
Aaron regularly speaks before industry groups, legal
organisations, government agencies and educational institutions at
conferences, seminars, roundtables and webinars. He has written
and co-written numerous articles, book chapters and handbooks on
privacy and cybersecurity issues.
Chris D. Hydak is an associate in the New York office of Hunton &
Williams.
He assists clients in identifying and managing privacy
and information security risks, and advises clients on federal, state
and international privacy obligations. His practice includes advising
a wide array of clients including financial services businesses,
technology companies, media companies, retailers, manufacturers
and telecommunications companies. He has also assisted clients in
the aftermath of a data breach, including in connection with a Federal
Trade Commission investigation and subsequent enforcement action
in federal court.
Hunton & Williams’ Global Privacy and Cybersecurity practice is known throughout the world for its deep experience, breadth of knowledge and
outstanding client service.
Chambers & Partners, The Legal 500 and Computerworld have named Hunton & Williams as a top firm for privacy and
cybersecurity. In addition to our legal practice, we distinguish ourselves through our Centre for Information Policy Leadership, which boasts the
active participation of more than 35 leading multinational corporations. For the latest resources in privacy, data protection and cybersecurity, visit
www.huntonprivacyblog.com and www.huntonregulationtracker.com.
This article presents the views of the author(s) and do not necessarily reflect those of
Hunton & Williams or its clients.
The information presented is for general information
and education purposes. No legal advice is intended to be conveyed; readers should
consult with legal counsel with respect to any legal advice they require related to the
subject matter of the article.
This article appeared in the 2016 edition of The International Comparative Legal Guide
to: Data Protection published by Global Legal Group Ltd, London. www.iclg.co.uk
286
WWW.ICLG.CO.UK
© Published and reproduced with kind permission by Global Legal Group Ltd, London
ICLG TO: DATA PROTECTION 2016
.
Other titles in the ICLG series include:
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
Alternative Investment Funds
Aviation Law
Business Crime
Cartels & Leniency
Class & Group Actions
Competition Litigation
Construction & Engineering Law
Copyright
Corporate Governance
Corporate Immigration
Corporate Recovery & Insolvency
Corporate Tax
Employment & Labour Law
Enforcement of Foreign Judgments
Environment & Climate Change Law
Franchise
Gambling
Insurance & Reinsurance
International Arbitration
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
â–
Lending & Secured Finance
Litigation & Dispute Resolution
Merger Control
Mergers & Acquisitions
Mining Law
Oil & Gas Regulation
Outsourcing
Patents
Pharmaceutical Advertising
Private Client
Private Equity
Product Liability
Project Finance
Public Procurement
Real Estate
Securitisation
Shipping Law
Telecoms, Media & Internet
Trade Marks
59 Tanner Street, London SE1 3PL, United Kingdom
Tel: +44 20 7367 0720 / Fax: +44 20 7407 5255
Email: sales@glgroup.co.uk
www.iclg.co.uk
. .