|
|||||||||||||||||||
PRIVACY
& INFORMATION LAW UPDATE |
|||||||||||||||||||
|
|||||||||||||||||||
|
|||||||||||||||||||
Feature
Article: For example, the collection of location, mapping, speed, and other information (such as safety-belt usage and other driving behavior data in private and commercial fleet vehicles, or property-specific mapping data to assist with pesticide application on farms) creates a valuable commodity that can be analyzed by companies for internal use, or sold to third parties for commercial purposes, including targeted advertising. Data collected by GPS devices is also sought-after by law enforcement. The Supreme Court recently heard oral argument in a case that involves law enforcement use of GPS tracking technology for investigative purposes. The outcome of this case could have a broad impact on GPS device manufacturers and licensees, including increased costs for complying with police investigations and business risks associated with limits on assurances that business can offer robust privacy guarantees to users. A very recent example of the business risks associated with privacy concerns is OnStars September 2011 announcement of proposed changes to its privacy policy. OnStars new privacy policy reserved the right to collect vehicle operation data from both customers using its GPS in-vehicle navigation and emergency response services, as well as such data from former customers who had cancelled their service but did not disconnect the OnStar device. This, along with OnStars decision to share or sell this data once anonymized caused an uproar that caught the attention of Congress and led to calls for an FTC investigation. On the congressional side, the Location Privacy Protection Act was introduced in the Senate earlier this year. The measure would require businesses that collect location information from mobile devices to obtain express customer consent before collecting that information or disclosing it to third parties. Certain types of companies would also be required to implement specific data security protections. In the EU, the Article 29 Working Party (the EU Advisory body on Privacy and Data Protection) recently adopted an opinion intended to clarify the privacy legal framework that applies to personal location data obtained from geolocation, including GPS-based, services. The trend for secondary uses of location data not contemplated at the time of collection is a privacy risk that was accentuated in the opinion. This trend could affect the EU compliance strategies of businesses that rely on GPS-collected data and that are subject to the EU privacy legal framework. As the collection, storage and use of GPS-based personal information becomes the norm in all facets of commerce, the risk of misuse of that data grows, seemingly exponentially. For example, employee on-the-job GPS-based monitoring enables the collection, retention and potential disclosure of personal information that could expose device manufacturers, employers, and users (as well as dealers and repair contractors) to legal risk. Questions about data ownership or control, and corresponding obligations to protect against the loss of proprietary data, or guard against unauthorized access and use of personal or business information, can also create significant exposure. Nevertheless, there are some practical steps that can be taken to minimize risk. Some of them include:
Organizations
in the data collection and distribution supply chain that understand the
opportunities and risks presented by the rapid adoption of GPS-based technology
will be better positioned to offer innovative products and services in
the future, while turning privacy compliance into a competitive advantage.
|
|||||||||||||||||||
FTC
and Operator of Children's Social Network Settle COPPA and FTC Act Charges
The Complaint noted that the Skid-e-kids website www.skidekids.com is directed at children and advertises itself as "the social networking alternative for kids ages 7 to 14." In order to register on the site, children were required to provide their date of birth, gender, username, password, and email address. Providing this information registered the child for Skid-e-kids, even though the site never first requested a parents email address or other contact information, and never attempted to notify parents or obtain parental consent. Once registered, children could create a profile by entering a first and last name, city and country, birth date, and gender, as well as freely type information in [an] about me field. The FTC concluded that the site collected and maintained personal information from children in violation of the COPPA Rule. The Complaint also focused on the Skid-e-kids privacy policy, which states, The Skid-e-kids.com website requires child users to provide a parent's valid email address in order to register on the website. We use this information to send the parent a message that can be used to activate the Skid-ekids account, to notify the parent about our privacy practices As the website never required children to provide a parents email address and never contacted parents to activate their childrens accounts, the FTC found that this privacy policy violated the FTC Act. Under the settlement Godwin, the operator, is required to destroy any information he collected in violation of the COPPA Rule. Godwin is also required to provide a conspicuous link to www.OnGuardOnline.gov for any websites he may operates for the next five years and must either retain a third-party to conduct audits or join one of the FTCs safe harbor programs. This settlement is a reminder that the FTC is aggressively enforcing COPPA, and that effort is unlikely to abate following the conclusion of the pending proceeding to update the COPPA rule. |
|||||||||||||||||||
Supreme Court Hears Arguments on Closely Watched GPS Case The case arose from an FBI-District of Columbia police investigation of Antoine Jones, a nightclub owner and suspected drug dealer. Surveillance of Jones included installation of a GPS tracking device to his vehicle. A warrant for the GPS device was obtained, but the device was installed after the warrant expired. Additionally, the device was installed in Maryland, although the warrant was only valid in the District of Columbia. The device collected information about Jones vehicles movements in relation to a house thought to be where Jones was storing drugs. Together with other plain view evidence (including visually monitoring Jones movements), police subsequently executed a search warrant and seized large amounts of drugs, weapons and cash. Jones was convicted in federal court of drug distribution charges. The D.C. Court of Appeals reversed on grounds that use of the GPS device was an unreasonable search under the Fourth Amendment. The Department of Justice appealed to the Supreme Court. The issues before the Court include whether warrantless use of a tracking device on a private vehicle to monitor the vehicles movements on a public street violate the Fourth Amendment and whether the Defendants rights were violated in this case by installing the tracking device without a warrant and without obtaining the Defendants consent. During oral arguments, the Supreme Court appeared unswayed by the government's contention that using the GPS device was a valid Fourth Amendment search. The government relied primarily on U.S. v. Knotts2 in which the Court concluded that a person traveling on public roads in a car has no reasonable expectation of privacy in his movements. Chief Justice Roberts challenged this contention, noting that tracking technology has changed significantly since 1983, when Knotts was decided. The other Justices similarly took issue with the governments position. For example, Justice Alito noted that in the pre-computer, pre-Internet age most of the privacy that people enjoyed was not the result of legal protections or constitutional protections; it was the result simply of the difficulty of traveling around and gathering up information."3 In addition to its potential impact on future law enforcement investigations, this case could result in increased legal costs for GPS providers seeking to resist turning over customer data to the police. These providers might be reluctant to turn over customer data out of concern that the perception of ready law enforcement access to user data could deter consumers from purchasing GPS products and services for their vehicles. Providers will want to ensure that a valid warrant has been properly obtained before disclosing customer data. 1 United
States v. Jones, No. 10-1259 (U.S. argued Nov. 8, 2011) |
|||||||||||||||||||
First
Circuit Finds Mitigation Costs Recoverable in Data Breach Case The First Circuit also considered the plaintiffs claims under the Maine Unfair Trade Practices Act. The lower court dismissed those claims because the plaintiffs did not allege a substantial injury. The First Circuit dismissed these claims as well, but on the grounds that some of the damages are not reasonably foreseeable and others are sufficiently recoverable under negligence and implied contract theories. However, the First Circuit reversed the lower court on the negligence and implied contract claims, finding that not only were the plaintiffs costs arising from the breach foreseeable, steps taken by the plaintiffs to minimize potential losses were reasonable mitigation costs, and therefore amounted to cognizable damages under Maine negligence and contract law. In reaching its ruling, the Court cited the delay in and inadequacy of Hannafords customer breach notification: because Hannaford only acknowledged the breach publicly more than 3 months after the breach, after over 1,800 fraudulent charges had been identified and failed to tell its customers whether their data was among the 4.2 million credit and debit card numbers stolen, the measures taken to mitigate potential losses by the plaintiffs was reasonable. The Court acknowledged that its ruling is contrary to the dozen cases cited by Hannaford in which courts found that, in cases of a data breach, the costs of credit monitoring services and identity theft insurance were not recoverable damages. The Court distinguished those cases as follows. First, most involved theft of computer equipment; theft of the data contained therein was incidental. Additionally, no evidence of unauthorized access or use of credit card data in those cases was adduced. Therefore, any injuries to the plaintiffs, including the need to purchase credit insurance, were speculative, not reasonable. By contrast, the Hannaford breach specifically targeted credit card data, resulting in thousands of fraudulent charges. Second, some of the cases cited by the Defendant involved hackers specifically targeting and accessing financial and other personal information. The plaintiffs in these actions sought damages for incurring costs associated with credit insurance and similar mitigation measures. However, unlike the Hannaford plaintiffs, the plaintiffs in the other cases never alleged that they or any other alleged victims had actually suffered identity theft or unauthorized charges. Accordingly, the Court concluded the mitigation costs were unreasonable and these cases were not persuasive. In sum, costs incurred by customers to mitigate potential losses from a data breach are more likely to be recoverable when the data stolen has been used for unlawful purposes or when the data specifically targeted in the breach consists of financial information. In order to minimize exposure under this case in the event of a claim for mitigation damages, businesses should be familiar with and implement industry best practices, and comply with applicable data breach notification laws. 1 Anderson v. Hannaford Brothers Co., Nos. 10-2384, 10-2450, 2011 WL 5007175 (1st Cir. 2011) |
|||||||||||||||||||
Ninth
Circuit Rules that the Electronic Communications Privacy Act Protects
Non-Citizens ECPA ECPA, enacted in 1986, protects electronic communications from unauthorized access by the government. The statute was subsequently updated with an amendment that added the Stored Communications Act (SCA), which protects electronic communications, such as emails, that are stored by Internet service providers. The SCA provides that a person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service.2 A public provider of email services (such as Microsoft through its Hotmail service), may not share its users emails with the government or any third party without a warrant or similar order. The SCA defines users as any person or entity who uses an electronic communications service.3 SUZLON v. MICROSOFT The issue before the Court in Suzlon involved construing the term any person. The underlying case involved a lawsuit in Australia between an Indian citizen, Rajagopalan Sridhar, and an Indian company, Suzlon Energy. Suzlon petitioned the court to force Microsoft to turn over Sridhars emails from his Microsoft Hotmail email account. Microsoft objected, and the 9th Circuit Court agreed, ruling that the SCA protects the emails of both citizens and noncitizens. Looking to the Freedom of Information Act (FOIA), the Court reasoned that the definition of any person is clear and should be construed as it is in the FOIA to apply regardless of a persons citizenship. The Court also found in the SCAs legislative history that Congress intended any person be read inclusively. Therefore, Microsoft was prohibited from sharing Sridhars emails with Suzlon. In reaching its decision, the Court considered Suzlons argument that Sridhars duty under Australian law to turn over the emails constituted implied consent to Microsofts disclosure of those emails. The Court rejected this argument, however, stating that Sridhar never consented to Microsoft disclosing his emails and that any duty to disclose lies with Sridhar, not a third party such as Microsoft. CONTEXT This decision is the latest in a line of cases applying ECPA to modern communications technologies. The law was written in 1986, prior to the explosion of email, instant messaging, texting, and social media. Since its enactment, courts have struggled to apply the law to new and emerging technologies, including defining what is protected by ECPA and which of ECPAs two levels of protection apply to each type of electronic communications. Over the last few years, calls have intensified for Congress to reform ECPA and clarify these issues, including calls from courts themselves.4 In the meantime, some courts have found that some aspects of ECPA which allow disclosure of electronic communications are unconstitutional under the Fourth Amendment.5 The Supreme Court weighed in last year when it found no Fourth Amendment violation when a police department audited the transcripts of text messages sent by officers on their city- provided pagers.6 CONCLUSION Under this decision, individuals, whether U.S. citizens or foreign nationals, who use American based communications services, including Microsofts Hotmail, Googles Gmail, and, likely, messaging on Facebook, are protected under ECPA against the government obtaining the contents of their communications without first going through the courts. Foreign companies who rely on American third party public providers for hosting their email services should likewise understand that the ECPA can be invoked by the email provider to resist a warrantless request to turn over their or their customers emails. One practical outcome of this decision will be to make discovery more costly and difficult. 1
Suzlon v. Microsoft, No. 10-35793 (9th Cir. Oct. 3, 2011)
|
|||||||||||||||||||
Study Finds Websites Leak PII in Referrer URLs and Headers
The leakage of identifying data was determined to be occurring through Request- URIs and Referrer headers, which include the URL of the page that the user is viewing or arrived from. By way of illustration, a third party with an ad displayed on example.com will receive a Referrer header indicating that their ad was viewed on example.com. Similarly, if a person clicks on a link on example.com that takes them to website.com, website.com will receive information indicating that the person arrived at website.com through a link from example.com, as well as personally identifying information about that individual. For example, if John Doe registers at example.com with the username JohnDoe and the email address johndoe@email.com companies displaying ads on example.com may receive a Referrer header that their ad was viewed on http://www.example.com/ username=JohnDoe&email=johndoe@email.com. The PII, in this example a username and email address, were embedded in the URL sent to the third party and could therefore be collected by the third party. According to the study, the disclosure and acquisition of PII, does not appear to be intentional. However, it is taking place in violation of the first party websites privacy policies. Moreover, many of the third party trackers receiving PII embedded in URLs claim they do not collect PII. The study concludes by suggesting that third party web tracking is not anonymous, despite claims to the contrary. This
study is unlikely to result in legislation. However, many data privacy
laws regulate the collection and sharing of PII by any method, whether
directly seeking it from a user or indirectly obtaining it through persistent
identifiers and, at the very least, require compliance with the companys
own privacy policies. In addition, findings in the previous
studies have emboldened the plaintiffs bar and have informed the theories
and allegations underlying
recent class actions. Accordingly, businesses should be familiar with
the tracking technologies they use for analytics or other purposes, and
whether those technologies place them in violation of their privacy policy,
which could expose them to enforcement or other legal proceedings. |
|||||||||||||||||||
FTC
Settles Complaint against App Developer over Default Privacy Settings For example, the default settings on the Android app meant that as soon as the app was installed by a user, all of the users photos, videos, audio files previously stored on the device were shared automatically over Frostwire's p2p network with all other Frostwire for Android users. Additional files or documents added by the user to the Android device after installation of Frostwire's app were also automatically shared under the default settings. The FTC also alleged misrepresentations in the set-up process and user interface of Frostwire's Windows application. In this version, the set-up process implied that files stored in a folder labeled "Save" would not be shared, whereas files stored in a folder labeled "Shared" would be publicly shared. The default settings, however, shared all files downloaded from the p2p network regardless of which folder they were stored in. In addition to compliance monitoring, reporting, and recordkeeping requirements, the settlement bars Frostwire from using default settings that will lead to inadvertent sharing and "and requires clear and prominent disclosures about file sharing and how to disable it." Frostwire applications must also allow users to disable sharing of files previously shared and in a manner substantially similar to selecting files for sharing. Frostwire must include a "clearly labeled link or distinctive icon" with the list of shared files to "clear and prominent written, graphical, and audiovisual instructions about how to disable sharing of files." With regard to versions of Frostwire applications already installed, Frostwire must offer free upgrades that bring those applications into compliance with the settlement. This settlement follows the FTC's April settlement with Google over its privacy policy representations and default settings in Google Buzz. In that case, Gmail users who clicked to sign up for Google Buzz had their list of most frequent email and chat contacts shared on their public Google profile by default, even though Googles privacy policy indicated that Google would ask for consent before using this information for any purpose other than providing email. The Google Buzz and Frostwire actions by the FTC are an indication that the Commission is looking closely at default privacy settings and whether users are adequately informed of the privacy implications of those settings in apps and other software. |
|||||||||||||||||||
Privacy
& Mobile Apps: Practical Steps for Minimizing Legal Risk The integration of mobile apps with geolocation (including hyperlocation) services, advertising (including interstitials), social media, cloud-based data storage services and mobile payment technologies -- such near field communications -- raises new questions about privacy and data ownership. Device and platform fragmentation add another layer of complexity to the privacy/ data ownership debate because the acquisition of consumer data is integral to monetizing content and attracting and retaining users. The adoption of mobile technologies by children creates potential legal exposure for apps who risk running afoul of laws intended to protect childrens online privacy. Within this ecosystem, the trade in consumer data has triggered regulatory, enforcement and class actions, as well as congressional and criminal investigations. Legal rights and responsibilities involving mobile apps are evolving, creating uncertainty about legal risk. Privacy has been a principle focus; however disputes about infringing uses of intellectual property have also attracted scrutiny. (See, e.g., Hershey Company v. Hotrix LLC, No. 10-cv-01178 (M.D. Pa. filed June 2, 2010)). Academic reports and media investigations have aroused suspicion about mobile apps and have formed the basis for claims in class actions filed around the country. Developers can reduce legal risk by being transparent about their business practices, becoming familiar with compliance obligations, and taking practical steps that include the following:
|
|||||||||||||||||||
UPDATES | |||||||||||||||||||
Comments
on Proposed Revisions to the COPPA Rule Due November 28 |
|||||||||||||||||||
E.U.
Data Protection Directive to be Updated Next Year |
|||||||||||||||||||
California
Enacts Song-Beverly Exemption for Zip Code Use by Gas Stations
|
|||||||||||||||||||
Privacy
Lawsuit Against Apple Dismissed |
|||||||||||||||||||
APEC
Leaders Endorse Cross-Border Privacy Rules |
|||||||||||||||||||
PRESENTATIONS & EVENTS | |||||||||||||||||||
|
|||||||||||||||||||
Copyright © 2010 St. Ledger-Roty & Olson, LLP. | |||||||||||||||||||