SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Safe Harbor: A framework for
        US – EU data privacy

           Raymond K. Cunningham, Jr.
              CRM, CA, CDIA+, CIPP/IT
What is Safe Harbor?

• Safe Harbor is a framework providing a bridge
  between the approaches taken by the United
  States and the European Union toward the
  protection of privacy
• Safe Harbor is for corporations and other
  organizations doing business in or with EU
  companies and subsidiaries
• Safe Harbor is voluntary
• Organizations self-certify to the principles of Safe
  Harbor
Safe Harbor

• Because of the implementation of the EU
  Directive on Data Protection in 1998 the transfer
  of personal data to non-EU states was to be
  halted
• In order to bridge the gap the US Department of
  Commerce and the EU Commission developed
  the Safe Harbor program
Why Safe Harbor?
• Privacy in the United States differs
  significantly from Privacy in Europe
• European Privacy is a basic human right
  Everyone has the right to respect for his
  private and family life, his home and his
  correspondence.
               - European convention for the Protection
           of Human Rights and Fundamental freedoms
Privacy in Europe
• Privacy is derived from the
  European Convention on Human
  Rights (1950) Article 8
• Directive on Data Protection
  Directive 95/46/EC was the result
  of 15 years of work to provide an
  EU framework on data protection
Data Protection Directive 95/46/EC

• The directive takes a comprehensive approach to
  privacy: the objectives are to protect individuals
  with respect to processing personal information
  and to ensure the free movement of personal
  information
• Personal data is defined as relating to an
  identifiable person.
• The directive is broad. Storage and retrieval are
  covered in the directive but transmission is not.
Data Protection Directive 95/46/EC

• Article 25 of the EU Directive prohibits any EU
  country from transferring personal data via the
  Internet to, or receiving data from, countries
  deemed to lack "adequate" Internet privacy
  protection.
• The United States is one such country with no
  national laws regarding Internet data privacy
Privacy in the United States
• Privacy has been defined in court
  decisions Roe v. Wade
• Privacy is protected through legislation
  in various areas:
  –HIPAA, COPPA, GLBA
  Privacy and security is also protected
  by self-regulatory initiatives - PCI-DSS
Benefits to Safe Harbor

• All member EU states are bound by the EU
  Commission’s finding of adequacy of SH
• Companies participating will be allowed data
  flows
• Prior approval of member states will be waived
  or automatically granted
• Claims brought by EU citizens will be heard in the
  US (some exceptions may apply)
A Word about Switzerland

• In 2008 the Swiss Federal Act on Data
  Protection (FADP) was modified and a Safe
  Harbor Program instituted
• The Swiss data protection application is
  identical to EU Safe harbor form and the
  process is also similar but it is separate
Safe Harbor Principles

•   Notice
•   Choice
•   Onward Transfer
•   Security
•   Data Integrity
•   Access
•   Enforcement
Safe Harbor Principles: Notice

• Organizations must provide a clear and
  conspicuous notice
• The information’s purpose and how it will
  be used must be stated
• A contact for questions or complaints
• Individuals must be told the types of third
  parties data is to be disclosed
Safe Harbor Principles: Choice
• The organization must give the opportunity for
  individuals to opt-out when:
  – Their information is transferred to a third party
  – Their information is used for a purpose for which it
    was not originally collected
• Mechanisms must be in place to exercise choice
Safe Harbor Principles: Choice

• People must be given affirmative or explicit
  opt-in choice if the following information is
  to be divulged to a third party
   –PII or PHI
   –For racial, ethnic, political opinions,
    religious or philosophical beliefs, trade
    union membership, sexual orientation
Choice – Explicit Opt-in
• Explicit opt-in gives the recipient a clear
  understanding of the process of opting-in or
  opting-out
• Opt-in – to request a service, single click
• Confirmed Opt-in – Confirmation email sent
  allowing them to unsubscribe
• Double Opt-in – Confirmation email sent and
  they must reconfirm
Safe Harbor Principles:
               Onward Transfer

• To disclose to a third party must apply the
  Notice and Choice principles.
• The organization MUST ascertain that the
  receiving party subscribes to the principles.
Safe Harbor Principles: Security
• Organizations must take reasonable
  precautions to protect information
  from loss, misuse, unauthorized
  access, disclosure, alteration and
  destruction
• Similar to PCI-DSS and GLBA
• ISO/IEC 27002 is a best practice
  formerly 17799
Safe Harbor Principles:
                    Data Integrity
• Personal information must be relevant for the
  purposes for which it is used
• An organization must not process information in
  a way that is incompatible with the purpose for
  which it has been collected or authorized by the
  individual
• Organizations should take reasonable steps to
  ensure that the data is reliable for its intended
  use, accurate, complete, and current
Safe Harbor Principles: Access

Individuals must have access to
personal information about them that
an organization holds and be able to
correct, amend, or delete that
information where it is inaccurate
Safe Harbor Principles: Access

EXCEPT where the burden or expense of
providing access would be disproportionate to
the risks to the individual’s privacy in the case in
question, or where the rights of persons other
than the individual would be violated.
Safe Harbor: Enforcement
• Enforcement mechanisms must include:
  – Readily available and affordable independent
    recourse mechanisms by which disputes are
    investigated and resolved and damages awarded
  – Follow up procedures for verifying that the
    organization makes about their privacy practices are
    true, the policies implemented as presented
  – Obligations to remedy problems arising out of failure
    to comply with the principles
  – Sanctions must be sufficiently rigorous to ensure
    compliance
Safe Harbor
• Self-assessment (in-house)
  – Maintain documentation
  – Have documentation available
  – Employee training
  – Conduct regular audits
• Outsource compliance review
  – Random reviews for compliance
  – Statements of compliance verification
  – All documents should be available upon request
Certification of Compliance
Safe Harbor: Enforcement
• The FTC is committed to reviewing referrals from
  privacy self-regulatory organizations such as
  BBBOnline and Truste.
• The FTC maintains a list of Safe Harbor
  companies on the web
• Member states alleging non-compliance can use
  the FTC’s Section 5 prohibiting unfair or
  deceptive acts
• The FTC may obtain civil penalties
Enforcement
• Fact: From November 2000 to 2009 NO
  actions were taken
• In November 2009 six companies were
  sanctioned and an injunction ordered
  against another
• Balls of Kryptonite, LLC was misleading
  customers stating self-certification
Important!

• Whatever you put into a Privacy
  Statement you must conform to the
  statement.
• Designate a point of contact to handle
  questions
• Keep your certification current!
Records Managers
• Records Managers are front-line players in
  privacy/security
• Records retention is directly tied to privacy
• Records access is directly tied to security
• Records managers in your organization should
  have some oversight role
• In 2006 the DPA condemned the retention of
  telecomm data on security grounds in response
  to the London and Madrid bombings
FAQ – Some Questions
• How do organizations provide for verifications
  that the attestations and assertions they make
  are being followed in accordance with the Safe
  Harbor Principles?
• Documenting the Self-assessment or having an
  outside firm audit the principles.
FAQ – Some Questions
• How does the Access Principle apply to
  Human Resources records?
• Safe Harbor requires that an organization
  processing such data in the US will
  cooperate in providing access either
  directly or through the EU employer.
FAQ – Some Questions
• What about data transferred to the US for data
  processing only?
• Data controllers in the EU are always required to
  enter into a contract. Data protection is always a
  key element to outsourced data storage or
  processing.
• Principles would not necessarily apply depending
  on the work to be done.
Pharma and Medical Products
• Do member states laws apply to personal
  medical data collected in the EU transferred to
  the USA?
  – Safe harbor principles apply after the transfer to the
    US. Anonymize data where appropriate
• What happens to an individual’s data if a
  participant decides to withdraw from a clinical
  trial?
  – Data collected previous to the withdraw; may be
    processed if it was made clear to the participant in
    the notice.
How much will it cost?

• Fees are $200 certifying for the first time
• Recertification is $100
• Payments are made to the Department of
  Commerce
• This is exclusive of fees to third parties for
  compliance
What is the Future?
•   The EU Directive is being rewritten (Dec. 2011)
•   The right to be forgotten
•   Data protection officers
•   Certification and seal programs
•   Breach Notifications
•   Data protection impact statements
•   Consent
•   New European Data Protection Board
What is the Future?

• The Right to be Forgotten
  – Adults should not be made to live in perpetuity with
    data they posted during a less mature point in their
    lives
• Breach Notification
  – Data controllers will be required to notify supervisory
    authority without undue delay – within 24 hours
Resources


• http://safeharbor.export.gov/list.aspx
• International Association of Privacy Professionals
  (IAPP) Sign up for free daily newsletter
• Federal Trade Commission (FTC)
• AICPA
Contact Ray Cunningham
cunningham@uif.uillinois.edu
      217 244-0658

Weitere ähnliche Inhalte

Was ist angesagt?

Design registration ip india pdf
Design registration ip india pdfDesign registration ip india pdf
Design registration ip india pdfAnshika Bhardwaj
 
Procedure of patents
Procedure of patents Procedure of patents
Procedure of patents Kamma K Babu
 
Enforcement of Intellectual Property Rights (IPR) in India
Enforcement of Intellectual Property Rights (IPR) in IndiaEnforcement of Intellectual Property Rights (IPR) in India
Enforcement of Intellectual Property Rights (IPR) in IndiaVijay Dalmia
 
Patent Filing in India
Patent Filing in IndiaPatent Filing in India
Patent Filing in IndiaBindu Kshtriya
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property RightsVINAYKUMARGOBBURI
 
World Intellectual Property Rights- WIPO
World Intellectual Property Rights- WIPOWorld Intellectual Property Rights- WIPO
World Intellectual Property Rights- WIPOVINOTH R
 
Compulsory liscencing
Compulsory liscencingCompulsory liscencing
Compulsory liscencingvishnugm
 
Energy Conservation Provisions in Building
Energy Conservation Provisions in BuildingEnergy Conservation Provisions in Building
Energy Conservation Provisions in BuildingVarun Jain
 
The Swedish Waste Management System
The Swedish Waste Management SystemThe Swedish Waste Management System
The Swedish Waste Management SystemHKTDC Nordics
 
plant variety protection and farmer act
plant variety protection and farmer actplant variety protection and farmer act
plant variety protection and farmer actbabalu patel
 
Budapest Treaty Presented
Budapest Treaty PresentedBudapest Treaty Presented
Budapest Treaty Presentedguestfcb11e
 
patent act 1970 ppt by srota dawn
patent act 1970 ppt by srota dawnpatent act 1970 ppt by srota dawn
patent act 1970 ppt by srota dawnSrota Dawn
 
Smart Cities of India
Smart Cities of IndiaSmart Cities of India
Smart Cities of IndiaMalav Patel
 
Presentation on environmental Protection act
Presentation on environmental Protection actPresentation on environmental Protection act
Presentation on environmental Protection actBhavikJain73
 

Was ist angesagt? (20)

Design registration ip india pdf
Design registration ip india pdfDesign registration ip india pdf
Design registration ip india pdf
 
Procedure of patents
Procedure of patents Procedure of patents
Procedure of patents
 
Enforcement of Intellectual Property Rights (IPR) in India
Enforcement of Intellectual Property Rights (IPR) in IndiaEnforcement of Intellectual Property Rights (IPR) in India
Enforcement of Intellectual Property Rights (IPR) in India
 
Patent Filing in India
Patent Filing in IndiaPatent Filing in India
Patent Filing in India
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
World Intellectual Property Rights- WIPO
World Intellectual Property Rights- WIPOWorld Intellectual Property Rights- WIPO
World Intellectual Property Rights- WIPO
 
Compulsory liscencing
Compulsory liscencingCompulsory liscencing
Compulsory liscencing
 
Energy Conservation Provisions in Building
Energy Conservation Provisions in BuildingEnergy Conservation Provisions in Building
Energy Conservation Provisions in Building
 
Patent system of india
Patent system of indiaPatent system of india
Patent system of india
 
Compulsory licensing (patents)
Compulsory licensing (patents)Compulsory licensing (patents)
Compulsory licensing (patents)
 
Industrial design
Industrial designIndustrial design
Industrial design
 
Kyoto protocol
Kyoto protocolKyoto protocol
Kyoto protocol
 
Patent Law 101
Patent Law 101Patent Law 101
Patent Law 101
 
The Swedish Waste Management System
The Swedish Waste Management SystemThe Swedish Waste Management System
The Swedish Waste Management System
 
Net zero energy building
Net zero energy buildingNet zero energy building
Net zero energy building
 
plant variety protection and farmer act
plant variety protection and farmer actplant variety protection and farmer act
plant variety protection and farmer act
 
Budapest Treaty Presented
Budapest Treaty PresentedBudapest Treaty Presented
Budapest Treaty Presented
 
patent act 1970 ppt by srota dawn
patent act 1970 ppt by srota dawnpatent act 1970 ppt by srota dawn
patent act 1970 ppt by srota dawn
 
Smart Cities of India
Smart Cities of IndiaSmart Cities of India
Smart Cities of India
 
Presentation on environmental Protection act
Presentation on environmental Protection actPresentation on environmental Protection act
Presentation on environmental Protection act
 

Andere mochten auch

Future of the ICT is now!
Future of the ICT is now!Future of the ICT is now!
Future of the ICT is now!Tomo Popovic
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the PitfallsBeginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the PitfallsRaymond Cunningham
 
The solar system of ainara
The solar system of ainaraThe solar system of ainara
The solar system of ainarafirstbilingual1
 
Matthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the foxMatthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the foxtherussianbear
 
BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016Dafne Patruno
 
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...Jeremy Gibberd
 
Sinopsis bab 12
Sinopsis bab 12Sinopsis bab 12
Sinopsis bab 12ayu227
 
St patrick's gac juvenile presentation nov10 reducedsize[1]
St  patrick's gac juvenile presentation nov10 reducedsize[1]St  patrick's gac juvenile presentation nov10 reducedsize[1]
St patrick's gac juvenile presentation nov10 reducedsize[1]ddrayne
 
Sinposis bab 11
Sinposis bab 11Sinposis bab 11
Sinposis bab 11ayu227
 
Csis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 pptCsis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 pptHamdani Nurdin
 
專題報告
專題報告專題報告
專題報告helen1398
 
Employers for Better Health
Employers for Better HealthEmployers for Better Health
Employers for Better HealthOttawa Kent
 
Antisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia SmithAntisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia Smithcheloina
 

Andere mochten auch (20)

Future of the ICT is now!
Future of the ICT is now!Future of the ICT is now!
Future of the ICT is now!
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the PitfallsBeginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
 
Saturno
SaturnoSaturno
Saturno
 
Proyecto solar system
Proyecto solar systemProyecto solar system
Proyecto solar system
 
The solar system of ainara
The solar system of ainaraThe solar system of ainara
The solar system of ainara
 
Matthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the foxMatthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the fox
 
Las estaciones del año
Las estaciones del añoLas estaciones del año
Las estaciones del año
 
BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016
 
Papercrafts 1ºd
Papercrafts 1ºdPapercrafts 1ºd
Papercrafts 1ºd
 
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
 
Sinopsis bab 12
Sinopsis bab 12Sinopsis bab 12
Sinopsis bab 12
 
9fms pp18
9fms pp189fms pp18
9fms pp18
 
St patrick's gac juvenile presentation nov10 reducedsize[1]
St  patrick's gac juvenile presentation nov10 reducedsize[1]St  patrick's gac juvenile presentation nov10 reducedsize[1]
St patrick's gac juvenile presentation nov10 reducedsize[1]
 
Sinposis bab 11
Sinposis bab 11Sinposis bab 11
Sinposis bab 11
 
Csis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 pptCsis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 ppt
 
專題報告
專題報告專題報告
專題報告
 
Employers for Better Health
Employers for Better HealthEmployers for Better Health
Employers for Better Health
 
Pregrado
PregradoPregrado
Pregrado
 
Presentaciónvenus
PresentaciónvenusPresentaciónvenus
Presentaciónvenus
 
Antisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia SmithAntisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia Smith
 

Ähnlich wie Safe Harbor: A framework for US – EU data privacy

Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Kimberly Verska
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareWinston & Strawn LLP
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protectionRachel Aldighieri
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015Rachel Aldighieri
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15Rachel Aldighieri
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMichelleSaver
 
The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...Browne Jacobson LLP
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterBrowne Jacobson LLP
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researcherskclcompbio
 

Ähnlich wie Safe Harbor: A framework for US – EU data privacy (20)

Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To Prepare
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, Exeter
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 

Mehr von Raymond Cunningham

Brick Streets in Homer Illinois
Brick Streets in Homer IllinoisBrick Streets in Homer Illinois
Brick Streets in Homer IllinoisRaymond Cunningham
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Document Imaging Basics for Campus Departments
Document Imaging Basics for Campus DepartmentsDocument Imaging Basics for Campus Departments
Document Imaging Basics for Campus DepartmentsRaymond Cunningham
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...Raymond Cunningham
 
Continuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIMContinuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIMRaymond Cunningham
 
Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity Raymond Cunningham
 

Mehr von Raymond Cunningham (8)

The cult of kim jong
The cult of kim jongThe cult of kim jong
The cult of kim jong
 
Brick Streets in Homer Illinois
Brick Streets in Homer IllinoisBrick Streets in Homer Illinois
Brick Streets in Homer Illinois
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Document Imaging Basics for Campus Departments
Document Imaging Basics for Campus DepartmentsDocument Imaging Basics for Campus Departments
Document Imaging Basics for Campus Departments
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
 
Continuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIMContinuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIM
 
Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 

Kürzlich hochgeladen

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Safe Harbor: A framework for US – EU data privacy

  • 1. Safe Harbor: A framework for US – EU data privacy Raymond K. Cunningham, Jr. CRM, CA, CDIA+, CIPP/IT
  • 2. What is Safe Harbor? • Safe Harbor is a framework providing a bridge between the approaches taken by the United States and the European Union toward the protection of privacy • Safe Harbor is for corporations and other organizations doing business in or with EU companies and subsidiaries • Safe Harbor is voluntary • Organizations self-certify to the principles of Safe Harbor
  • 3. Safe Harbor • Because of the implementation of the EU Directive on Data Protection in 1998 the transfer of personal data to non-EU states was to be halted • In order to bridge the gap the US Department of Commerce and the EU Commission developed the Safe Harbor program
  • 4. Why Safe Harbor? • Privacy in the United States differs significantly from Privacy in Europe • European Privacy is a basic human right Everyone has the right to respect for his private and family life, his home and his correspondence. - European convention for the Protection of Human Rights and Fundamental freedoms
  • 5. Privacy in Europe • Privacy is derived from the European Convention on Human Rights (1950) Article 8 • Directive on Data Protection Directive 95/46/EC was the result of 15 years of work to provide an EU framework on data protection
  • 6. Data Protection Directive 95/46/EC • The directive takes a comprehensive approach to privacy: the objectives are to protect individuals with respect to processing personal information and to ensure the free movement of personal information • Personal data is defined as relating to an identifiable person. • The directive is broad. Storage and retrieval are covered in the directive but transmission is not.
  • 7. Data Protection Directive 95/46/EC • Article 25 of the EU Directive prohibits any EU country from transferring personal data via the Internet to, or receiving data from, countries deemed to lack "adequate" Internet privacy protection. • The United States is one such country with no national laws regarding Internet data privacy
  • 8. Privacy in the United States • Privacy has been defined in court decisions Roe v. Wade • Privacy is protected through legislation in various areas: –HIPAA, COPPA, GLBA Privacy and security is also protected by self-regulatory initiatives - PCI-DSS
  • 9. Benefits to Safe Harbor • All member EU states are bound by the EU Commission’s finding of adequacy of SH • Companies participating will be allowed data flows • Prior approval of member states will be waived or automatically granted • Claims brought by EU citizens will be heard in the US (some exceptions may apply)
  • 10. A Word about Switzerland • In 2008 the Swiss Federal Act on Data Protection (FADP) was modified and a Safe Harbor Program instituted • The Swiss data protection application is identical to EU Safe harbor form and the process is also similar but it is separate
  • 11. Safe Harbor Principles • Notice • Choice • Onward Transfer • Security • Data Integrity • Access • Enforcement
  • 12. Safe Harbor Principles: Notice • Organizations must provide a clear and conspicuous notice • The information’s purpose and how it will be used must be stated • A contact for questions or complaints • Individuals must be told the types of third parties data is to be disclosed
  • 13. Safe Harbor Principles: Choice • The organization must give the opportunity for individuals to opt-out when: – Their information is transferred to a third party – Their information is used for a purpose for which it was not originally collected • Mechanisms must be in place to exercise choice
  • 14. Safe Harbor Principles: Choice • People must be given affirmative or explicit opt-in choice if the following information is to be divulged to a third party –PII or PHI –For racial, ethnic, political opinions, religious or philosophical beliefs, trade union membership, sexual orientation
  • 15. Choice – Explicit Opt-in • Explicit opt-in gives the recipient a clear understanding of the process of opting-in or opting-out • Opt-in – to request a service, single click • Confirmed Opt-in – Confirmation email sent allowing them to unsubscribe • Double Opt-in – Confirmation email sent and they must reconfirm
  • 16. Safe Harbor Principles: Onward Transfer • To disclose to a third party must apply the Notice and Choice principles. • The organization MUST ascertain that the receiving party subscribes to the principles.
  • 17. Safe Harbor Principles: Security • Organizations must take reasonable precautions to protect information from loss, misuse, unauthorized access, disclosure, alteration and destruction • Similar to PCI-DSS and GLBA • ISO/IEC 27002 is a best practice formerly 17799
  • 18. Safe Harbor Principles: Data Integrity • Personal information must be relevant for the purposes for which it is used • An organization must not process information in a way that is incompatible with the purpose for which it has been collected or authorized by the individual • Organizations should take reasonable steps to ensure that the data is reliable for its intended use, accurate, complete, and current
  • 19. Safe Harbor Principles: Access Individuals must have access to personal information about them that an organization holds and be able to correct, amend, or delete that information where it is inaccurate
  • 20. Safe Harbor Principles: Access EXCEPT where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy in the case in question, or where the rights of persons other than the individual would be violated.
  • 21. Safe Harbor: Enforcement • Enforcement mechanisms must include: – Readily available and affordable independent recourse mechanisms by which disputes are investigated and resolved and damages awarded – Follow up procedures for verifying that the organization makes about their privacy practices are true, the policies implemented as presented – Obligations to remedy problems arising out of failure to comply with the principles – Sanctions must be sufficiently rigorous to ensure compliance
  • 22. Safe Harbor • Self-assessment (in-house) – Maintain documentation – Have documentation available – Employee training – Conduct regular audits • Outsource compliance review – Random reviews for compliance – Statements of compliance verification – All documents should be available upon request
  • 24. Safe Harbor: Enforcement • The FTC is committed to reviewing referrals from privacy self-regulatory organizations such as BBBOnline and Truste. • The FTC maintains a list of Safe Harbor companies on the web • Member states alleging non-compliance can use the FTC’s Section 5 prohibiting unfair or deceptive acts • The FTC may obtain civil penalties
  • 25. Enforcement • Fact: From November 2000 to 2009 NO actions were taken • In November 2009 six companies were sanctioned and an injunction ordered against another • Balls of Kryptonite, LLC was misleading customers stating self-certification
  • 26. Important! • Whatever you put into a Privacy Statement you must conform to the statement. • Designate a point of contact to handle questions • Keep your certification current!
  • 27. Records Managers • Records Managers are front-line players in privacy/security • Records retention is directly tied to privacy • Records access is directly tied to security • Records managers in your organization should have some oversight role • In 2006 the DPA condemned the retention of telecomm data on security grounds in response to the London and Madrid bombings
  • 28. FAQ – Some Questions • How do organizations provide for verifications that the attestations and assertions they make are being followed in accordance with the Safe Harbor Principles? • Documenting the Self-assessment or having an outside firm audit the principles.
  • 29. FAQ – Some Questions • How does the Access Principle apply to Human Resources records? • Safe Harbor requires that an organization processing such data in the US will cooperate in providing access either directly or through the EU employer.
  • 30. FAQ – Some Questions • What about data transferred to the US for data processing only? • Data controllers in the EU are always required to enter into a contract. Data protection is always a key element to outsourced data storage or processing. • Principles would not necessarily apply depending on the work to be done.
  • 31. Pharma and Medical Products • Do member states laws apply to personal medical data collected in the EU transferred to the USA? – Safe harbor principles apply after the transfer to the US. Anonymize data where appropriate • What happens to an individual’s data if a participant decides to withdraw from a clinical trial? – Data collected previous to the withdraw; may be processed if it was made clear to the participant in the notice.
  • 32. How much will it cost? • Fees are $200 certifying for the first time • Recertification is $100 • Payments are made to the Department of Commerce • This is exclusive of fees to third parties for compliance
  • 33. What is the Future? • The EU Directive is being rewritten (Dec. 2011) • The right to be forgotten • Data protection officers • Certification and seal programs • Breach Notifications • Data protection impact statements • Consent • New European Data Protection Board
  • 34. What is the Future? • The Right to be Forgotten – Adults should not be made to live in perpetuity with data they posted during a less mature point in their lives • Breach Notification – Data controllers will be required to notify supervisory authority without undue delay – within 24 hours
  • 35. Resources • http://safeharbor.export.gov/list.aspx • International Association of Privacy Professionals (IAPP) Sign up for free daily newsletter • Federal Trade Commission (FTC) • AICPA