Proud sponsor of 1410 Q Street: DCs Innovation Hot Spot! |
|||||||||||
PRIVACY
& INFORMATION LAW UPDATE |
|||||||||||
|
|||||||||||
|
|
||||||||||
Featured
Article: The case arose when the City of Ontario initiated an investigation into an exchange of text messages originating from the lead Plaintiff, Quon, a city SWAT team officer, to his wife and two other SWAT team members, including one with whom he was romantically involved. The Citys service plan had a monthly character limit for outgoing messages tied to each device and the City was charged a fee for exceeding the limit. The City had a policy that warned employees that they should have no privacy expectation in communications sent over their Department-provided devices. Despite the policy, Quons superior told him that his text messages would not be audited as long as he personally paid for any overages. Quon exceeded the monthly character limit, prompting the Police Chief to investigate whether 1) the character limit was too low for the Citys law enforcement needs and, if so, 2) whether police officers were being required to pay for sending work-related messages. At the Citys request, its service provider, Arch Wireless, searched the text messages on Quons pager and provided the City with a transcript of his messages. The City then conducted an audit of Quons on-duty messages. The audit revealed that the majority of the messages Quon sent during work hours were personal, many of which were sexually explicit. Quon, his wife, and the two other colleagues brought suit against the City and Arch Wireless claiming in part that the audit violated their Fourth Amendment rights. The district court concluded that the Citys audit was reasonable because its purpose was to determine whether the service plan was appropriate and not simply to investigate Quons use of his government- issued pager. The Ninth Circuit reversed. It ruled that although conducted for a legitimate purpose, the search was unreasonable because there were less intrusive means the City could have utilized to determine whether the service plan was inadequate for the police departments needs. The Supreme Court reversed the Ninth Circuit. Writing for the majority, Justice Kennedy concluded the search was reasonable, noting that the Citys policy reserved the right to monitor employee communications and therefore limited employee expectations of privacy in them. The Court rejected Quons argument that the policy was informally modified by his superiors assurance that his text messages would not be audited as long as he paid for overages. Although narrowly decided on Fourth Amendment grounds, this opinion seems to recognize that the Court will ultimately be asked to decide the appropriate framework for determining the respective rights of employers and employees with respect privacy in the workplace when it comes to employee communications and employee privacy regarding those communications. Nevertheless, this case strongly suggests that employers can take the following measures to minimize the risk of litigation initiated by employees, as well as by non- employees involved in a questionable exchange:
|
|||||||||||
FTC
Floats "Do Not Track Concept The FTC is expected to issue a report this fall that could contain this recommendation, as well as other approaches for protecting online privacy. For example, Liebowitz indicated that the FTC is considering recommending that businesses prominently display their privacy policies most "material terms" in a small box so that questionable or confusing practices arent buried in small print. A Do Not Track registry would be a clear departure from the FTCs past emphasis on industry self-regulation, triggering concerns about the impact on the data driven and supported Internet. The impetus for a Do Not Track approach should be viewed in the broader context of the pace of innovation and the broad outcry about the impact of innovation (including increasingly invasive tracking technologies, such as geolocation tracking, application-embedded advertising, and the convergence of offline and online tracking), on privacy. The day after the Senate Commerce Committee hearing Senator Kerry indicated his intent to introduce privacy legislation, adding to other pending initiatives including proposals recently introduced by Representatives Boucher and Rush. The challenge appears to continue to be one of balancing the benefits of a data driven Internet while protecting individual privacy. An approach that integrates self-regulation, transparency, technology accessible consumer tools as well as clear industry guidance from policymakers may be more effective in achieving this balance than stringent regulation that reflects a snapshot in time. Businesses of all sizes that depend on consumer data will have to stay abreast of developments at the FTC, including the anticipated release this fall of the agencys privacy report, as well as the status of pending privacy legislation. |
|||||||||||
Privacy
and the Dodd-Frank Wall Street Reform & Consumer Protection Act Many consumer protection responsibilities currently handled by other federal agencies, including FDIC, Office of Thrift Supervision, HUD and the FTC will be consolidated in the Board. Even where existing agencies retain authority over other functions, including primary financial examination authority, responsibility for interpreting virtually all financial consumer laws and promulgating rules will lie with the Board. The Board has significant authority to regulate privacy, data disclosure, storage and access. In addition, the Board has rulemaking authority under specified statutes that address consumer privacy protections, including the Fair Credit and Reporting Act and Gramm-Leach-Bliley. Some of these protections include requiring covered entities or persons to indentify indicia of identity theft or practices that can affect data transfer, including information provided to consumer credit reporting agencies. At the same time it appears that other agencies will retain jurisdiction over similar consumer protection functions, like the FTC and its recently promulgated Red Flags Rule (enforcement of which has been delayed until December 31, 2010) and the Document Disposal Rule. Other laws, including the Privacy Act of 1974 and the Right to Financial Privacy Act of1978 have been or will be amended to authorize CFPB jurisdiction and oversight. With over 200 anticipated rulemaking proceedings, many of which will be initiated by the Board, much uncertainty remains about how existing rules will be construed and perhaps modified and how new statutory provisions will be implemented. The Directors Senate confirmation process may provide a useful opportunity to potentially impact the regulatory environment. |
|||||||||||
Industry
reacts to FTC's COPPA Rule Review The COPPA Rule currently prohibits operators of commercial websites and online services from collecting personal information from children under the age of 13 without first seeking the consent of a parent or legal guardian. These entities must also employ reasonable measures to protect the confidentiality, security and integrity of the information they collect. Earlier this year, the FTC explained that it had decided to accelerate review of the COPPA Rule in light of changes to the online environment since the Rule was issued some 15 years ago. Instead of proposing a new rule, the FTC issued a request for public comment about the ability of the current Rule to protect childrens online privacy in light of rapid developments in technology. Some of these developments, including increased use of mobile technology by children to access the Internet and the impact of corresponding location based services on childrens privacy, interactive gaming and social media. The FTC specifically sought information about the availability of new technologies that can be used to filter content generated by children prior to posting; whether operators have the ability to contact specific individuals using information collected from children online, including persistent IP addresses, mobile geolocation data, or information collected in connection with behavioral advertising; whether the rules definition of personal information should be expanded accordingly; whether there are new tools for obtaining verifiable parental consent that should be added to the rule, and whether any of the current enumerate methods should be removed. There was general consensus among industry that the COPPA Rule is a familiar and appropriate scheme for achieving the important objective of protecting children online. At the same time, commenters urged the FTC to refrain from making changes that could interfere with innovation in childrens online services. For example, expanding the definition of personal information or the Internet, or raising the Rules current age trigger could pose numerous administrative and compliance challenges to website operators which could, in turn, make it more difficult for businesses to engage young people, and in some instances even adults online. The outcome of this proceeding could have a significant impact on businesses that are subject to its requirements. Childrens website operators and any online service that knowingly collects information from children under 13 should be familiar with the current COPPA Rule. These businesses should review their privacy policies and information practices for compliance. Businesses should also monitor related developments at the FTC, including the anticipated release of a report seeking statutory changes, and, possibly, a proposed rule. Businesses should also keep abreast of ongoing enforcement actions brought under the current Rule. |
|||||||||||
Flash
Cookie Lawsuits Sound Warning for Industry Flash cookies, more accurately known as locally stored objects, can be used by websites to collect cookie like information on a users computer. They can be used for such diverse purposes as remembering preferences, watching online video, setting default volume levels on video players or assigning a unique ID to users for tracking across the web, regardless of browser. Most users are unaware that when a Flash cookie is deposited on a computer the steps they take to prevent online tracking by deleting traditional browser cookies typically do not remove Flash cookies. The Plaintiffs in Quantcast brought suit against MTV, ESPN, Hulu, MySpace & Scribd, among other websites, alleging that their use of LSOs (or Flash cookies) secretly stored user data on Adobes Flash Player to recreate information contained in browser cookies that had been deleted by users. Also named as a defendant was San Francisco-based advertising technology company Quantcast creator of the LSO used by the websites. Clearspring was filed on behalf of parents and their children against one of Quantcasts competitors, Clearpsring Technologies, as well as several websites including Disney, Warner Bros. Records, SodaHead and Demand Media. The Plaintiffs claim that Clearspring simultaneously deposited http cookies and a Flash cookie in users Flash media payers when users visited the defendants websites. When users deleted the http cookies from their browsers, unbeknownst to them, the Flash cookie restored and/or recreated history and other information, including the users name and IP address, which in turn, was used by the defendants and others for online tracking and ad serving. The Plaintiffs also claim that the defendants privacy policies failed to disclose that users activities were being tracked online through the use of Flash cookies. While some of the factual allegations in each action may differ somewhat the fundamental grievance is the same: that the defendants used a technology to track the plaintiffs online activities without notice or consent. Although the lawyers are, for the most part targeting high-profile, deep pocket defendants, at least one of the defendants, SodaHead, is a small online polling company; no website should be considered under the radar. It would not be surprising to see this effort expanded to other websites that rely on Flash or similar tracking technology, including social media sites, particularly as those sites add location based features. We expect that this suit will be closely watched by the Plaintiffs bar, privacy advocates and policymakers. The larger issue appears to be one of consumer knowledge about and control over the collection and use of their information and less about specific technology. That said, the use of technologies like Flash cookies should be viewed as risky because they enable tracking online activities without a users knowledge, including when consumers believe they have taken the necessary steps to prevent tracking. Companies that employ Flash cookies or similar tracking technologies that can be used to override consumer privacy preferences should monitor developments in these proceedings. In the process, they should consider taking measures to try to minimize the potential for becoming a target for this type of lawsuit. At a minimum, companies should firmly understand the capabilities of the tracking technologies they employ and the extent of information collected; they should provide clear notice of the use of these technologies in their privacy policies. If Flash cookies are employed, companies should prominently disclose their use and provide a link to Adobes site for instructions for deleting these cookies. Companies may also want to consider alerting customers to other tools that can delete flash cookies or prevent them from being used altogether. |
|||||||||||
Federal
Court Rules that Certain Postings on Social Network Sites are not Discoverable
Under Stored Communications Act In reaching its decision in Crispin v. Audigier, Inc., 2010 WL 2293238, (C.D. Cal. 2010), the Court undertook an extensive analysis of the SCA noting, in the process, the difficulty of applying a statute that was enacted over 2 decades ago to todays communications technologies and users practices. That said, this case could alter the way content posted on social networks is managed by organizations in anticipation of potential litigation. This case could also create legal risk for organizations seeking access to social network communications in other contexts -- affecting, for example, the ability of employers to lawfully obtain information about employees or potential hires by viewing social network communications. The plaintiff, an artist, initiated a copyright infringement action against a clothing designer, alleging breach of an oral license for the limited use of the Plaintiffs artwork in the manufacture of certain types of garments. The Complaint included allegations that the Defendant violated the terms of the license by failing to include the Plaintiffs logo on various garments displaying the Plaintiffs designs and also sublicensed the Plaintiffs design work without the Plaintiffs consent. During discovery the Defendants served subpoenas on various third parties, including Facebook, MySpace and other social networking websites. The Defendants claimed that the Plaintiffs social media communications revealed the nature and terms of the agreement between the parties. The Court granted the Plaintiffs motion to quash the subpoenas granted by a Magistrate on grounds that 1) the social network sites private messaging and e- mail webmail services constituted electronic communications services (ECS) under the SCA and 2) the web hosting websites and social networking websites were ECS providers under the SCA, which protects unopened private messages transmitted via an ECS provider as temporary storage. 18 U.S.C. § 2510(17) (A). In so ruling, the Court concluded that a private, undeleted message opened by a user renders the communication stored for backup purposes as defined in the statute. The Court noted that other aspects of social networking sites, Facebook wall postings and comments and MySpace comments presented a distinct and more difficult question requiring an analysis of the SCA, including understanding the distinction between an RCS provider and an ECS provider. Analyzing the statute, the Court first noted observed that the SCA defines an ECS provider as any service which provides to users the ability to send or receive wire or electronic communications. 18 U.S.C. § 2510 (15). The Court next observed that the SCA defines an RCS provider as an entity providing the public computer storage or processing services by means of an electronic communications system, and that an electronic communications system is defined as any wire, radio electromagnetic, photoptical or photo electronic facilities for the transmission of wire or electronic communications and any computer facilities or related electronic equipment for the electronic storage of such communications. Id. §2510(14); §2702(a)(2). The Court construed these provisions to conclude that social networking services are RCS providers with respect to wall postings and comments since the posts, once made, are stored by the provider within the meaning of the SCA. Accordingly, the Court held that wall postings and comments are protected under the SCA either as restricted access electronic bulletin boards or because social networks are RCS providers that store comments for limited use by a restricted number of users. The case was remanded to the Magistrate to ascertain whether the Plaintiffs privacy settings rendered the wall postings public and beyond the protection of the SCA. This case illustrates the challenge courts face when applying a law enacted over two decades ago to rapidly evolving electronic communications technologies. This dilemma is ongoing as regulators and policy makers struggle to keep pace with innovation resulting in a platform specific approach to protecting privacy an approach that poses challenges to users and business alike as each tries to discern a predictable framework for ascertaining privacy protection for user generated content. This case should also be seen as a cautionary tale for employers who may now find themselves running afoul of the law if they obtain access without consent to their employees' social networking sites communications when the employees have opted to restrict access. This decision also calls into question whether an employer can use legal processes such as a subpoena to obtain information from the private social networking accounts of employees. |
|||||||||||
Rush
Introduces Privacy Bill Covered entities or persons would be required to provide notice of information collection practices, including:
Covered entities would also be required to establish, implement and maintain reasonable and appropriate administrative, technical and physical safeguards to ensure the security, integrity, and confidentiality of the covered information or sensitive information it collects, assembles, or maintains; protect against any anticipated threats, reasonably foreseeable vulnerabilities, or hazards to the security or integrity of such information; and protect against unauthorized access to or use of such information and loss, misuse, alteration, or destruction of such information. The measure contains a private right of action that enables aggrieved parties to seek actual plus punitive damages, costs and attorney's fees for violations. A safe harbor provision would shield companies from private litigation provided they participate in and comply with an FTC-approved self-regulatory program. The bill also distinguishes between sensitive and other types of personal information. Sensitive information includes information that relates directly to an individuals medical history or health, race or ethnicity, religious beliefs/affiliations, sexual orientation/behavior, financial information (income, assets, liabilities, etc.), individual geolocation, unique biometric information or social security number. Covered information includes first name or initial and last name, postal address, email address, telephone/fax number, government issued identification numbers (e.g. tax ID, drivers license number, etc.), financial account numbers, credit/debit card number, access codes/passwords, unique persistent identifiers used to collect, store or identify information about a specific individual or create a profile (e.g. customer numbers, IP addresses, unique pseudonym), and any information collected, stored, used or disclosed in connection with the foregoing information. The definition excludes certain enumerated business-related information. The combined effect of these definitions is to move U.S. privacy law closer to the EU Privacy Directive and other similar approaches. The bill contains an exemption for small businesses that retain less than 15,000 names, e-mail addresses, or other personal information in their records. The language appears to be broad enough to apply to small enterprises like local retailers, mom & pop services like plumbers and handymen, and even individuals who retain e-mail addresses on computing equipment. The bill requires the FTC to promulgate a number of regulations, and businesses that violate those regulations could face fines of up to $5 million. Although the measure is unlikely to be enacted prior to the mid-term elections similar efforts could gain momentum in subsequent sessions if high profile incidents like those involving confusion over Facebooks privacy settings and Googles unauthorized data collection associated with its Street View tool. Even then, a likely outcome could be a law that focuses more on website transparency than on restricting how they collect information. Commercial entities that collect and retain personal information online should monitor the status of this measure for possible amendments that could expand its reach. Businesses should also review their privacy policies and data protection practices to make sure they reflect current practices and comply with applicable existing laws. |
|||||||||||
Red
Flags Rule Postponement Redux Creditor" is currently broadly defined to include "any person who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of any original creditor who participates in the decision to extend, renew, or continue credit."2 Accordingly, the Rule applies to businesses as diverse as newspapers, lawyers, medical professionals, retailers that offer financing or process credit applications as well as mom and pop retailers that routinely bill in arrears for goods and services. Many entities that do not consider themselves creditors may be surprised to discover that they are covered under the rule. Companies should assess their business practices -- including their billing practices -- carefully to determine whether they are covered by the broad "creditor" definition. Following numerous requests for exemption, the FTC initially delayed enforcement until May 1, 2009 as it sought to clarify which entities would be covered. The American Bar Association subsequently filed suit in U.S. District Court for the District of Columbia to block enforcement as to lawyers, arguing in part that the act of billing a client is not an extension of credit that turns every lawyer and law firm into a creditor. The ABA also contended that in applying the rule to lawyers the FTC failed to articulate a rational connection between the practice of law and identify theft. Despite the FTCs decision to delay enforcement of the Rule and the pending litigation, businesses that provide services to their customers for which those customers are later billed should assess their current programs for detecting and responding to potential identity theft. While it is possible that some types of businesses may obtain an exemption, the majority of businesses that bill in arrears will likely be required to comply. |
|||||||||||
HHS
Proposes changes to HIPPA Privacy Rules
In addition to the changes to the HIPAA Rules, HHS announced changes to its breach notification website that are intended to provide consumers with more information regarding breaches involving PHI and ongoing breach investigations. The Federal Register Notice was published on July 14, 2010. Comments can be filed with HHS through September 13, 2010. |
|||||||||||
Karen
Neuman to Discuss Risks & Best Practices for Local Government Use
of Social Media |
|||||||||||
Copyright © 2010 St. Ledger-Roty & Olson, LLP. | |||||||||||