|
||||||||||||||||||
PRIVACY
& INFORMATION LAW UPDATE |
||||||||||||||||||
|
||||||||||||||||||
|
||||||||||||||||||
Dont
Stop Thinking About Tomorrow The body of global law that governs the handling and securing of personal information continued to expand in 2012, topping the list of concerns for general counsel and senior management. This trend will continue in 2013, posing complex challenges for early-stage ventures with limited budgets as well as established companies with greater resources. Now is the time to anticipate and plan for the following trends: Mobile Privacy. In 2012 mobile apps faced heightened scrutiny by authorities, privacy advocates and class action lawyers. Earlier this year California Attorney General Kamala Harris announced the adoption of a Joint Statement of Principles that will, at a minimum, require apps to adopt and adhere to privacy policies. In August Harris created privacy and e-crimes unit within the states Justice Department. It is widely anticipated that other states will follow Californias lead. This month Harris filed suit against Delta Air Lines for its failure to include a privacy policy within its mobile app that complies with the states online privacy law. The National Telecommunications and Information Administration launched proceedings to develop industry self- regulatory privacy codes for mobile apps as part of the Administrations broader consumer privacy plan to develop similar codes for other sectors. While the process has been contentious it appears that the codes, which will be subject to FTC enforcement, will build on the recommendations in the FTCs Privacy Report for improved consumer disclosures and greater privacy choices and controls for users of mobile services. Together, the Privacy Report and self-regulatory codes can be expected to provide a useful roadmap for the privacy class action bar. Meanwhile, the Federal Communications Commission issued a Public Notice soliciting comments about how wireless service providers store user data on their mobile devices and the application of existing privacy and security requirements to that information. Such notices are typically the first step in a process that culminates in new regulations. In the waning days of the 112th Congress the Senate approved a location tracking measure that would impose stringent obligations on mobile apps and the platforms on which they are made available. This measure is likely to be the starting point for the new Congress when it takes up location privacy in the new session. In light of these developments, companies should be prepared for heightened scrutiny of mobile privacy practices in 2013, particularly in the following contexts:
Cloud Computing. As data storage continues to migrate to the cloud, new types of cloud computing services will be offered, including hybrid public/private clouds and personal cloud storage solutions. These developments will require a thoughtful approach to negotiating contract terms that adequately address data ownership and control, cross-border legal frameworks, quality of service commitments, meaningful recourse for catastrophic loss, outages and security lapses, and physical location of servers. Many cloud storage service agreements favor the service provider while lacking important protections for the businesses that use these services. Organizations should be fully prepared to negotiate for something other than a take it or leave it arrangement with their provider. Doing so will require a comprehensive understanding of how the global body of applicable law imposes and allocates risk. Cybersecurity. Increasingly sophisticated tactics are being used by cybercriminals and organized state actors to pose threats to critical infrastructure and capture and misuse consumer data. These tactics are partially enabled by certain behavioral and technological changes, including the move from company- issued to bring your own device (BYOD) workplace practices (although many companies lack adequate BYOD policies); employee use of social networks in the workplace; the digital, interconnected economy; and the use of cloud computing for off-shore data processing. It is widely anticipated that President Obama will issue an Executive Order modeled after the Cybersecurity Act of 2012 that was defeated by Senate Republicans. The measure would have incentivized operators of critical infrastructure to adhere to data security best practices and granted the Department of Homeland Security oversight powers to implement the bills recommendations. Congresss failure to pass cybersecurity legislation does not mitigate business exposure to civil liability and enforcement of state and federal data security and breach laws. Absent a modern, unified cybersecurity law framework, companies will have to manage cybersecurity risks by implementing such measures as negotiating for appropriate provisions in commercial agreements; and developing incident response plans that comply with U.S. and international law -- including, in some jurisdictions, implementing plans in the event of suspected, as opposed to actual incidents. General Counsel and senior management will need to monitor ongoing policy developments and be thoroughly familiar with existing U.S. and International laws and regulations. Cross Border. 2012 saw the adoption of comprehensive privacy and data security laws across the globe. This trend was driven in part by the pervasiveness of digital technology in commerce and daily life, and the fact that countries are vying to attract investment by becoming trusted destinations for data storage and processing services. While the effect has been the elimination of borders for users of technology, the response has been an explosion of global privacy and data security laws. Inconsistencies in these laws, and their application, will pose challenges for companies that collect and transfer data in and among multiple jurisdictions. In addition, proposed amendments to the EU Privacy Directive will require businesses to prepare for the eventual adoption of the new regime. Although the law will result in greater legal certainty for U.S. businesses, the proposed framework will create new rights and obligations, and includes a number of changes that could significantly impact how US companies collect, retain and use EU citizens data. More power will be granted to local data protection authorities, including the power to impose significant fines for noncompliance. It appears that the amendments may not take effect until 2014. Meanwhile, member states continue to update and enforce their data privacy laws, including against U.S. based companies. |
||||||||||||||||||
FTC
Approves Amendments to COPPA Rule On December 19, 2012 the FTC announced that it approved final amendments to the Childrens Online Privacy Protection Act (COPPA) Rule. The final rule becomes effective July 1, 2013. It will significantly expand COPPAs reach, subject many businesses to its notice, consent and other requirements and create unique challenges for new ventures, including app developers. The FTCs announcement concludes a lengthy process during which it sought multiple rounds of comments and issued numerous proposed changes to the current version of the rule.1 There are no surprises -- with the following notable exceptions: 1) it retains the email plus method of obtaining parental consent, and 2) as explained more fully below, it imposes actual instead of the proposed constructive knowledge on operators of general audience sites, apps and online services that collect information from users who are under 13. Key changes include:
What it means for Business: The rules amendments are already being criticized as adding new ambiguities to a regulatory framework that has long been regarded as unnecessarily complex and a barrier to entry for many new ventures. Some of these ambiguities may be addressed by the FTC in the form of updated FAQs. In announcing the final rule, however, the FTC chairman made clear that the agency intends to educate both consumers and business through vigorous enforcement actions with remedies that will include fines. Child directed sites and services that dont collect personal information from children who are under 13 but rely on third party service providers that collect under-13 data through these sites will now have to comply with COPPAs notice and consent requirements. In addition, a principle focus of the FTC in this proceeding involved mobile devices and how children use those devices to access and interact with online sites and services, including mobile apps, games and social media. Developers who incorporate software from multiple sources will now be subject to new COPPA obligations that may require modifying existing agreements. The new rule applies to specific categories of operators of online websites, apps and services identified above. If your site or service potentially falls into one of these categories, you should, at a minimum, undertake a thorough and informed review of the new rule to determine its potential impact on your business (including your current COPPA compliance strategy), and devise and implement appropriate measures. 1 The agency accelerated its statutorily required review of the rule in 2009 to address the rapid adoption of and access to interactive particular mobile and social network technologies. The FTC sought comments on proposed changes and, in response to them issued a Notice of Supplemental Rulemaking on a further revised rule.
|
||||||||||||||||||
FTC Seeks
Information from Data Brokerage Companies About Data Collection &
Use Practices
Earlier this year the FTC called on the data broker industry to improve the transparency of its practices as part of the FTC's report, Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. The Report establishes a voluntary framework to protect consumer data for businesses engaged in behavioral advertising. The framework recommends best practices that include adopting privacy by design design, consumer control, and increased transparency for the collection and use of consumer data. The Report noted that while data brokers collect, maintain, and sell a wealth of information about consumers, they often do not interact directly with consumers. Rather, they get information from a wide variety of public records and purchase information from other companies that is sold (or used to create profiles) for marketing and other purposes. The FTCs inquiry occurs as the industry is being closely scrutinized for how it compiles and discloses personal information. In June, the FTC fined Spokeo, Inc., a data broker, for compiling and selling peoples personal information for use by potential employers in screening job applicants in violation of the Fair Credit Reporting Act.1 Earlier this year the House Privacy Caucus and Senate Commerce Committee sent separate letters to data broker companies seeking information similar to that being sought by the FTC. Responses to the FTCs orders are due February 1, 2013. According to the press release, they will be used to make recommendations on whether and how the data broker industry could improve its privacy practices. 1 15 U.S.C. § 1681 et seq. |
||||||||||||||||||
FTC
Asked to Investigate Childrens Apps
On December 17, 2012 the Center for Democracy and Technology (CDT) filed a complaint with the Federal Trade Commission asking it to investigate the privacy practices of the childrens cable network Nickelodeon and Playfirst, a San Francisco-based game developer. The complaint alleges that Nickelodeon and Playfirst violated the Childrens Online Privacy Protection Act (COPPA) Rule and engaged in deceptive practices in violation of the Federal Trade Commission Act. Playfirst developed an app for Nickelodeon that integrates characters from Nickelodeons SpongeBob Square Pants program into Playfirsts Diner Dash app. The app was launched in 2012 and was available in the i-tunes store until Nickelodeon it pulled it following the filing of the complaint. According to the Complaint, the app asks children who are under 13 years old to provide their full name, email address and other online contact information without first seeking and obtaining verifiable parental consent in violation of the COPPA Rule. The app also allegedly fails to provide a COPPA compliant privacy notice informing parents about what information is collected from their children and how the information is used. In addition, although the app is free to download and the game can be played for free, players are encouraged to buy virtual coins that can be used to purchase certain items, or pay for a premium version of the game. The complaint also alleges that the app uses unique device identifiers (UDIDs) and device tokens that permit companies to unlawfully send custom messages to individual children. UDIDs are personal information under the just-revised COPPA rule. Just one week earlier, the Center for Digital Democracy (CDD) filed a similar complaint against Mobbles Corporation, operator of the childrens game Mobbles, which involves capturing, collecting, trading and caring for virtual pets. The game is available in the i-tunes and Google Play stores. The complaint alleges that Mobbles is directed at children who are under 13 and collects personal information from them without first obtaining parental consent. That information includes physical address and online contact data as well as location based data that is used to determine and share the physical location of children who play the game. The filing of these Complaints coincides with the FTCs heightened and well publicized focus on childrens mobile privacy. As we reported here and here, the agency has made good on its promise to vigorously enforce COPPA, including against apps and their developers. Moreover, the FTCs report, Mobile Apps for Kids: Disclosures Still Not Making the Grade, indicates that the agency remains troubled by the privacy practices of apps since it issued a report in 2011 that examined the same issues. The report signaled that additional enforcement actions involving childrens mobile privacy may be coming. In this context, it should come as no surprised that the recently amended COPPA Rule seems to provide the agency with tools to enforce COPPA as even very young children access and interact with ever- evolving technology. Accordingly, companies can expect childrens mobile privacy to be a priority in the new year. |
||||||||||||||||||
Senate
Judiciary Committee Approves Revised Version of Location Privacy Protection
Act On December 13, the Senate Judiciary Committee approved a revised version of S. 1223, the Location Privacy Protection Act of 2011, introduced by Al Franken (D-MN), Chairman of the Senate Judiciary Subcommittee on Privacy, Technology and the Law. While fiscal cliff concerns have effectively paralyzed Congress, this measure should be seen as a framework for addressing mobile privacy in the new Congress. An earlier version of the bill would have imposed civil penalties on businesses for the nonconsensual collection of personal information from mobile devices, including smartphones, tablets, laptops and in-vehicle navigation devices on. The measure approved by the Senate includes a requirement that companies to obtain a users consent prior to collecting or sharing mobile location data. It also bans mobile apps that secretly monitor a users location. Franken had pushed for inclusion of the ban to address so-called stalking apps and their use by abusers in domestic violence cases. The revised measure contains some exceptions, including for law enforcement and to help parents locate a missing child and receive certain notifications. And, in apparent recognition that users interact with multiple mobile devices, the bill authorizes a one-time opt-in for the collection and sharing of location based data to avoid having users consent each time their data is collected and shared. The Act contains a private right of action and would also be enforced by the Department of Justice, State Attorneys General. It would not preempt more stringent state laws. |
||||||||||||||||||
Fifth
Circuit Rules that Personal Cell Phone is not a 'Facility' Under Stored
Communication Act On December 12, 2012, the United States Court of Appeals for the Fifth Circuit ruled in Garcia v. City of Laredo1 that the Stored Communication Act (SCA)2 does not apply to data stored in a personal cell phone. The Courts finding is consistent with other court rulings and one that continues to distinguish between providers and users of facilities that courts have drawn in determining the scope of facilities under the SCA. In reaching its decision, the Court rejected the Plaintiffs claim that her employer, the City of San Laredo, Texas, unlawfully accessed text messages and images stored on her cell phone. The SCA provides in relevant part:3
Garcia was a former police dispatcher who was fired after a police officer's wife removed Garcia's phone from an unlocked locker and discovered text messages and images on Garcia's phone that violated department policy. On appeal, Garcia argued that the District Court erred in granting summary judgment for the defendants on grounds that the SCA did not apply to the texts and images kept on Garcia's phone.4 The Fifth Circuit upheld the District Courts ruling and rejected Garcia's argument on appeal. The Court concluded that Garcias cell phone was not a facility; nor were its contents in electronic storage. While the SCA does not define the term "facility," courts have routinely interpreted the statute to apply to the facilities operated by electronic communication service providers such as telephone companies, Internet or e-mail service providers, and electronic bulletin boards but not end users.5 However, courts have also held that an individual's computer, laptop, or mobile device is not a facility under the SCA.6 For example, in iPhone Application, the Court noted that accepting plaintiffs' argument that their iPhones constituted a facility would render the SCA illogical because another section of the statute authorizes providers of an electronic communication service to grant access to a facility.7 Accordingly, interpreting the term facility to include a mobile device would have the bizarre effect of allowing service providers to grant third party access to an individual's home computer, laptop, or mobile device.8 The Garcia Courts analysis adds to the growing number of courts distinguishing between providers and users when interpreting the SCAs reach. Thus, the Court observed that "'the relevant 'facilities' that the SCA is designed to protect are not computers that enable the use of an electronic communication service, but instead are facilities that are operated by electronic communication service providers and used to store and maintain electronic storage.'"9 The Court also rejected Garcia's claim that the texts and images on her cell phone were in electronic storage. The SCA punishes unauthorized access of electronic communication "while it is in electronic storage."10 Under the SCA "electronic storage" means wire or electronic communication in either "temporary, intermediate storage [...] incidental to the electronic transmission" or storage "by an electronic communication service for the purpose of backup protection."11 Again, courts have relied on the distinction between providers and users in interpreting electronic storage under the SCA. "Information that an internet or email provider stores to its servers, information stored with a telephone company, and information maintained by an electronic bulletin board operator if such information is stored temporarily pending delivery or for purposes of backup protection are examples of protected electronic storage under the statute."12 On the other hand, information stored on a personal cell phone does not fall under the statutory definition of "electronic storage," according to the Fifth Circuit. "An individual's personal cell phone does not provide an electronic communication service just because the device enables use of electronic communication services [...]. Accordingly, the text messages and photos stored on Garcia's phone are not in 'electronic storage' as defined by the SCA and are thus outside the scope of the statue."13 The current distinction between providers and users drawn by courts that have construed the SCA highlights the difficulty of assessing data security and privacy risk and obligation in this context. Users access, interact with and retain vast amounts of data during the life cycle of that data, regardless of whether it is kept on his or her own device, hard-drive or on an ISPs or e-mail provider's servers. Users often make no distinction between the image stored in email on a provider's servers and the same image that has been downloaded to the user's computer, laptop, or mobile device, but as Garcia makes clear, the SCA does not protect data stored on an individual cell phone. *Seth is a recent graduate of the Indiana University Maurer School of Law who interned at the Federal Communication Commission. Currently awaiting admission to the bar, Seth has also written about the potential impact the Performance Right Act on student radio stations.
1 No. 11-41118, 2012 LEXIS 25370, (5th Cir. 2012). |
||||||||||||||||||
Developers
& Platforms Beware: California Attorney General On December 6, 2012, California Attorney General Kamala Harris filed suit against Delta Airlines, Inc. in San Francisco Superior Court for failing to post a privacy policy within its Fly Delta mobile app in violation of the California Online Privacy Protection Act (Act). The lawsuit is the first legal action filed by Harriss office for noncompliance with the Act. Delta was among the companies that were sent notices by Harris giving them 30 days to conspicuously post a privacy policy within their mobile apps about what personally identifiable information is collected by the app and how it will be used. Customers who download the app can use it for to view reservations, check-in and track checked baggage. According to the complaint the app collects personal information including a users name, gender, date of birth, phone number, frequent flyer account number, geolocation information and in some instances photos. Although Deltas website posts a privacy policy, the complaint alleges that the sites policy fails to refer to the Fly Delta app and in any event is not reasonably accessible to the apps users. The Complaint seeks injunctive and monetary relief, including asking the court to prohibit Delta from making the app available until it complies with the Act and impose penalties of up to $2,500 for each time the app is downloaded without a compliant privacy policy. This action comes on the heels of agreements reached earlier this year with a number of mobile apps and social media platforms, including Amazon, Apple, Facebook Google and RIM to bring their privacy practices into compliance with the Act. A clear takeaway is that disclosures about mobile app data collection and use in a companys website privacy policy alone do not comply with the letter of the law. This lawsuit, together with Harriss focus on mobile app privacy since the creation of Californias new privacy enforcement unit, indicates that Harris intends to make compliance with the Act a top priority. Other enforcement actions are likely to follow. Companies should familiarize themselves with the Act to make sure their privacy practices comply with it. |
||||||||||||||||||
FCC
Rules Confirming Opt-Out Texts Do Not Violate TCPA
The TCPA, which applies to landline and mobile telephones, prohibits the use of automatic telephone dialing systems to send unsolicited advertising calls (or faxes) to consumers without their prior express consent. In February the FCC updated2 rules implementing the TCPA to align them with the Federal Trade Commissions Telemarketing Sales Rule,3 including eliminating the business relationship exemption and making certain changes to the TCPAs prior express consent requirement. The FCCs ruling was issued in response to a petition filed earlier this year by SoundBite Communications, Inc.4 SoundBite had previously been sued under the TCPA for sending, on behalf of businesses, confirming opt-out texts in response to consumer opt-out requests. In its petition, SoundBite asked the FCC to address whether a one-time confirmatory text message violates the TCPA and whether the system used by SoundBite to send the opt-out confirmations is an automatic telephone dialing system as defined by the TCPA. The FCC only addressed the issue of whether confirmatory text messages constitute TCPA violations. The FCC declined to rule on other issues raised in SoundBites petition, including whether its confirmation messages are not covered by the TCPA because the software used to send them are not autodialers under the TCPA. This question is likely to be addressed by the FCC in the future, which is considering whether certain technologies and types of consent are subject to or permitted under the TCPA.
1 47 U.S.C. §227. |
||||||||||||||||||
INTERNATIONAL DISPATCHES | ||||||||||||||||||
Article 29 Working Party Announces Launch of Binding Corporate Rules for Processors On December 21 the European Commissions Article 29 Working Party announced the launch of Binding Corporate Rules (BCRs) for data processors. The BCRs will serve as internal codes of conduct that govern transfers of personal data outside the European Union by a processor who acts on behalf of and under the instructions of data controllers. The beneficiaries of these BCRs will be entities that perform high volume data processing for EU data controllers that transfer data outside the EU. BCRs that are approved will eliminate the need for processors to negotiate for adequate protections for data transfers outside the EU for each processing contract. Data processors will be required to seek the approval of data protection authorities that is similar to the process that is already in place for data controllers. The BCRs take effect January 1, 2013. |
||||||||||||||||||
EU Data Protection Supervisor Issues Opinion on Cloud Computing in Europe On November 16 Peter Hustinx, the European Data Protection Supervisor (EDPS) issued an opinion addressing the impact of the proposed EU Data Protection Regulation on cloud computing services that involve the storage of personal data on servers or in data centers that are located outside the EU. The opinion is the latest in a series of recent policy initiatives to accelerate the adoption of cloud computing in Europe in order to realize the economic benefits of cloud services and establish Europe as a global destination for safe and secure computing. The EDPS is an independent supervisory authority that promotes good practices among EU institutions and bodies by providing advice on policies and legislation that affect privacy and cooperating with similar authorities to ensure consistent data protection. Hustinxs opinion addresses key challenges to simultaneously promoting cloud computing while ensuring that data is protected in a manner that will be consistent with the stringent standards and requirements of the new Data Protection Regulation. Some of these challenges involve how to allocate responsibility for personal data among cloud clients and service providers within a legal framework that protects individuals but where businesses that collect that data are typically business customers of the service providers. Another, related challenge involves how to allocate responsibility for personal data among organizations in the cloud computing supply chain in a manner that is aligned with the regime embodied in the Data Protection Regulation. That regime places explicit data protection and security obligations on organizations that collect personal data, yet the service providers take it or leave it terms make compliance with the Regulation difficult for these organizations. One way of dealing with this contractual asymmetry suggested by the opinion would be to designate the cloud service provider a co-data controller. Doing so would lead to a more realistic allocation of responsibilities between the parties which would occur during negotiation of service agreements Even so, the disparity in bargaining power between the parties might not be eliminated. According to the opinion, this problem could be overcome by the development and use of standard contract terms and conditions. The opinion also addresses challenges posed by the International character of cloud computing. Hustinx calls for adapting international data transfer mechanisms to the cloud computing environment, including Binding Corporate Rules, standard contractual clauses and developing effective international cooperation mechanisms. Interestingly, in perhaps a subtle acknowledgement of challenges posed to cloud service providers obligations under the Data Protection Regulation by the U.S. Patriot Act, the opinion also calls for international cooperation to reconcile the manner in which access to personal data is sought by law enforcement and to clarify the conditions under which law enforcement may gain access to personal data stored by cloud service providers. Finally, Hustinx calls for multilateral agreements with non-EU countries as necessary. |
||||||||||||||||||
French Data Protection Authority Publishes English Language Compliance Guides On November 14 the French Data Protection Authority, Commission Nationale de lInformatique et des Libertés (CNIL), released English-language version of its security and privacy risk management guides. According to the news release, the guides consist of a privacy risk management methodology and a catalogue of measures helping organizations to choose the appropriate controls to protect their personal data processing operations. The guides can be accessed here and here. They provide practical guidance on data retention, management and security. |
||||||||||||||||||
UPDATES | ||||||||||||||||||
Senate Approves Data Sharing Amendment to VPPA On December 20, 2012 the U.S. Senate approved amendments the Video Privacy Protection Act (VPPA) to make it easier for consumers to share their video-viewing preferences and habits online, including over social media. If enacted, video rental and streaming providers like Netflix, Hulu, Amazon, and Youtube would be permitted to share information on Facebook, Twitter, and other social media about what movies a customer rented or watched with that customers blanket consent. Netflix had been strongly lobbying for this change since it announced the integration of its video rental and streaming service with Facebook on September 22, 2011. Since that time, Netflix users in every country except the United States had been able to share with their friends over Facebook what videos they watched on Netflix. Netflix had contended that the VPPA prevented it from offering this feature in the U.S. As reported here, the amendments were passed in the House in 2011. |
||||||||||||||||||
New Jersey Bars Access to Student Personal Accounts On December 3 a new law took effect in New Jersey that prohibits both public and private college and university officials from requiring students or applicants to grant access to personal online accounts or services offered through electronic communications devices. The law also prohibits officials from retaliating against a student or applicant for their refusal to grant access and from inquiring in any way about whether a student or applicant has an online profile or social media account. Unlike other states that have enacted similar laws, the New Jersey statute contains an anti-waiver provision and does not provide a law enforcement exception. The law contains a private right of action for injunctive and monetary relief. |
||||||||||||||||||
FTC Clarifies Definition of Creditor In Red Flags Rule On November 30, 2012, the Federal Trade Commission announced that it issued an interim final rule that clarifies the definition of creditor in the Red Flags Rule (Rule) to align it with the definition of the term in the Red Flag Program Clarification Act of 2010 (Act). As we reported previously, the Act was intended to end uncertainty about the Rules application. The Red Flags Rule requires certain creditors to establish policies and procedures for detecting signs of potential identity theft, or red flags and take specified measures in response. The term "creditor" was broadly defined to include "any person who regularly extends, renews, or continues credit or any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of any original creditor who participates in the decision to extend, renew, or continue credit." Many businesses were surprised to discover that they were subject to the Rule, including lawyers, newspapers, medical professionals, and mom and pop retailers. An avalanche of requests for exemption and an ABA lawsuit prompted numerous FTC decisions to delay enforcement. The Interim Final Rule excludes most lawyers, health care providers and certain other businesses, limiting the Rules application only to creditors that in the ordinary course of business: 1) obtain or use consumer reports, directly or indirectly, in connection with a credit transaction; 2) furnish information to certain consumer reporting agencies in connection with a credit transaction; or 3) advance funds to or on behalf of a person, based on a persons obligation to repay the funds or on repayment from specific property pledged by or on the persons behalf. The FTC is seeking public comment before the Rule becomes final on February 11, 2013. |
||||||||||||||||||
California Supreme Court to Consider Application of Song-Beverly to Online Transactions The California Supreme Court is poised to rule on a key issue involving the states zip code privacy law. As we reported previously, two years ago the Court ruled in Pineda v. Williams Sonoma Stores that the Song-Beverly Credit Card Act of 1971 (Song-Beverly), prohibits the collection and recording of customer zip code data by brick and mortar merchants as a condition of accepting payment during credit card transactions. Pineda resulted in a flood of lawsuits against a wide variety of retailers, and prompted retail gas stations to successfully seek a statutory exemption to the law. In 2011 a state trial court refused to dismiss actions against Apple, e-Harmony and Ticketmaster for alleged Song-Beverly violations and the California Court of Appeals affirmed. The Complaints alleged that the companies collected address information from consumers during online credit card transactions involving purchases that did not need to be shipped, making the collection of zip codes unnecessary to complete the transactions. In its Petition for Review Apple contends that the plain language of Song-Beverly demonstrates that it does not apply to online retailers and that any finding to the contrary would defeat the laws purpose, which is to prevent fraudulent transactions. |
||||||||||||||||||
Copyright © 2012 St. Ledger-Roty & Olson, LLP. | ||||||||||||||||||