SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Copyright 2013 BryanCave LLP
May 30, 2013
Jason D. Haislmaier
jason.haislmaier@bryancave.com
Data “Property” Rights
Copyright 2013 BryanCave LLP
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
This presentation is intended for general informational purposes only and should not
be construed as legal advice or legal opinion on any specific facts or circumstances,
nor is it intended to address specific legal compliance issues that may arise in
particular circumstances. Please consult counsel concerning your own situation and
any specific legal questions you may have.
The thoughts and opinions expressed in this presentation are those of the individual
presenters and do not necessarily reflect the official or unofficial thoughts or opinions
of their employers.
For further information regarding this presentation, please contact the presenter(s)
listed in the presentation.
Unless otherwise noted, all original content in this presentation is licensed under the
Creative Commons Creative Commons Attribution-Share Alike 3.0 United States
License available at: http://creativecommons.org/licenses/by-sa/3.0/us.
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data
Privacy
Security
Rights
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Increasing importance
Increasing value
Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
What “rights”
protect data?
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
No specific
comprehensive legal protection
for data or databases
in the US
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data
as
Property
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
?Data
Rights
Data
Privacy
Data
Security
Copyright
Trade
Secret
Contract
Industry
Practice
State
Law
FTC
Action
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data Rights
• No specific comprehensive protections under US law
• Protection is available through generally applicable legal areas
– Copyright
– Trade secret
– Contract
– Other legal theories (but generally limited)
• Growing data privacy and security protections are also shaping
rights in data
– General purpose laws
– Industry-specific federal laws
– State data security and privacy laws
– Increasing federal (and state) enforcement actions
In General
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data Rights
• Limited attempts at comprehensive protection exist outside of the US
• Focused on data in the form of databases
• EU Database Directive (96/9/EC)
– Protection for non-original portions of databases not protected by copyright law
– Based on the investment in obtaining, verifying, or presenting the contents of
the database
– Prevents extraction or re-utilization of all or a portion of the contents of a database
• Limited examples of analogous laws in other countries as well
Protections Outside of the US
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Trademarks
Branding and
Identity
Patents
Ideas and
Inventions
Trade Secrets
“Know-How”
Copyrights
Creative
Expressions
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Traditional IP Rights In Data
• Patents
– Available to protect databases
• Structure
• Method of operation
• Business methods employing databases
– But the databases must meet the criteria for patent protection
– Less applicable in the case of unstructured “raw” data
• Trademarks
– Applicable in connection with the name or brand for a product or service
– Not applicable to data or databases themselves
Patents and Trademarks
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• U.S. copyright law does not provide specific or express protection to
data or databases
• Copyright protection for data and databases is analyzed
like any other work of authorship
• The standard for obtaining a copyright is relatively low
– Original work of authorship
– Fixed in a tangible medium of expression
• But, data and databases are not always afforded protection
Copyright
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
“The vast majority of works make the grade quite easily,
as they possess some creative spark, no matter how
crude, humble or obvious. ”
Justice Sandra Day O’Connor
Feist Publications, Inc. v. Rural
Telephone Service Co.
499 U.S. 340 (1991)
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
“No one may claim originality as to facts [. . .] facts do not
owe their origin to an act of authorship. The distinction is
one between creation and discovery. The first person to
find and report a particular fact has not created the fact; he
or she has merely discovered its existence.”
Justice O’Connor in Feist
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Copyright does not protect data in the form of facts
– Originality, not “sweat of the brow,” is the basis for copyright protection
– Facts are not originally authored or created through mere discovery
• Copyright can protect information or content in the form of
original expressions
– Information or content having some level of creativity
– Entertainment content, new media, UGC may all meet this test
– Unstructured raw data in the form of facts will often fail the test
• This results in inconsistent protection for data and databases
– Unstructured raw data – no protection available
– Original information or content having some level of creativity – protection available
– Structure, coordination, and arrangement of data – “thin” protection available (for the
compilation, but not for the underlying data)
Copyright
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Nearly all states have adopted some version of the Uniform Trade
Secrets Act (UTSA)
• Under the UTSA, a “Trade Secret” is information that:
– Is not generally known to other persons and cannot be readily ascertained by other
persons without improper means
– Provides the holder with economic advantage or economic value (in some cases derived
from its secrecy)
– Is the subject of efforts that are reasonable under the circumstances to maintain its
secrecy
• Broad potential applicability to data and databases
– Virtually any type of data or information
– In nearly any form or format
• Trade secrets covering data and databases are enforceable as long as
the requirements are met
Trade Secret
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Traditional IP rights provide
only limited and inconsistent
protections
Where to turn?
Traditional IP Rights In Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Emerging as a primary form of protection for data
• Permit broad protection, potentially even over data and databases not
subject to traditional IP protection
• Limited to the entities bound by the contract
• Even where traditional IP protection is not available, contracts have
become critical to obtaining and clarifying rights in data
– Each form of IP has its own rules regarding ownership
– Left to applicable law, ownership is often (very) unclear
– At best this leaves the potential for confusion
– Assignments and licenses are preferred to clarify these rights
• Industry expectations have risen with the rising value of data
– Contracts required to evidence adequate rights in transactions involving data
– Not unlike rights in software itself
Contracts
Contract Rights in Data
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Other sources of protection. . .
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Data Privacy
Data Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
No specific comprehensive
data privacy or security legislation
in the US
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• EU Data Protection Directive (95/46/EC)
• Regulates the processing of personal data of EU subjects
– Broad scope of “personal data”
– Restricts processing unless stated conditions are met
– Prohibits transfer to countries not offering adequate levels of protection
• Requires the member countries to pass consistent laws (more or less)
• US Department of Commerce-negotiated “Safe Harbor Principles” enable
transfers to US companies
– Self-certification regime
– Allows US companies to register as compliant
– FTC oversight
• Proposed overhaul in the works (announced Jan. 25, 2012)
Longstanding Comprehensive EU Regulations
Data Privacy and Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• State consumer protection statutes
– All 50 states
– Prohibitions on “unfair or deceptive” trade practices
• Data breach notification statutes
– At least 46 states (DC and various US territories)
– Notification of state residents (and perhaps regulators) affected by unauthorized access
to sensitive personal information
• Data safeguards statutes
– (Significant) minority of states
– Safeguards to secure consumer information from unauthorized access
• Data privacy statutes
– Online privacy policies covering use and sharing of consumer information
– Use of personal information for direct marketing purposes
Growing Array of Relevant State Laws
Data Privacy and Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Consumer credit - Fair Credit Reporting Act (FCRA)
• Financial services - Gramm Leach Bliley Act (GLBA)
• Healthcare providers - Health Insurance Portability and Accountability Act
(HIPAA)
• Children (under 13) - Children’s Online Privacy Protection Act (COPPA)
• Video content - Video Privacy Protection Act
• Others statutes covering education, payment processing, etc.
Industry-specific Federal Statutes
Data Privacy and Security
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Federal Trade Commission Act
(15 U.S.C. 41, et seq)
“Unfair or deceptive acts or practices”
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• Trend toward increasing enforcement
– More than 45 actions to date
– More than 25 in the last 6 years
– Many more investigated but not brought
• Covering largely electronically stored data and information
• Targeting data security as well as data privacy
• Increasing trend toward mobile data privacy and security
Increasing Activity
FTC Enforcement Actions
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Emerging Models
For Compliance
FTC Enforcement Actions
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• 20 year term
• Cease misrepresentations regarding practices for information security, privacy,
confidentiality, and integrity
• Conduct assessment of reasonably-foreseeable, material security risks
• Establish comprehensive written information security and privacy program
• Designate employee(s) to coordinate and be accountable for the program
• Implement employee training
• Conduct biennial independent third party security and privacy assessments
• Implement multiple record-keeping requirements
• Implement regular testing, monitoring, and assessment
• Undergo periodic reporting and compliance requirements
• Impose requirements on service providers
Legislation by Consent Decree
FTC Enforcement Actions
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Not just enforcement. . .
Standards
Best practices
Codes of Conduct
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
• We are in an era of increasing data value
• Increasing value means greater focus on data rights
• We do not have the benefit of strong and comprehensive laws to match
• Data “rights” are defined through an increasingly broad array of sources
– Traditional IP rights,
– Contract protections
– Growing data privacy and data security obligations
• Understand the protections, understand the inconsistencies
• Issues relating to data will only continue to increase
(transactions and litigation)
Lessons Learned
Closing Thoughts
Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP
Copyright 2013 BryanCave LLP
Thank You.
Jason Haislmaier
jason.haislmaier@bryancave.com
@haislmaier
http://www.linkedin.com/in/haislmaier

Weitere ähnliche Inhalte

Was ist angesagt?

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataOpenAIRE
 
International e discovery ceic 2012d
International e discovery ceic 2012dInternational e discovery ceic 2012d
International e discovery ceic 2012dJames Daley
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 

Was ist angesagt? (20)

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
International e discovery ceic 2012d
International e discovery ceic 2012dInternational e discovery ceic 2012d
International e discovery ceic 2012d
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 

Andere mochten auch

Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Savina Bueno
 
19888 annals 2_head
19888 annals 2_head19888 annals 2_head
19888 annals 2_headsundar sivam
 
Project Delivery
Project DeliveryProject Delivery
Project DeliveryCODETE
 
Summer of Love Festival
Summer of Love FestivalSummer of Love Festival
Summer of Love FestivalStefantastik
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...Jason Haislmaier
 
Experiencia significativa bosa
Experiencia significativa bosaExperiencia significativa bosa
Experiencia significativa bosadaalvale
 
[1] sk kd bina
[1] sk   kd bina[1] sk   kd bina
[1] sk kd binaferiyeye
 
Las poleas en la física
Las poleas en la física Las poleas en la física
Las poleas en la física Jhon3443
 
L'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterL'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterLuisella Mori
 
Follet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialFollet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialaulasaludable
 
Prevención del cáncer
Prevención del cáncerPrevención del cáncer
Prevención del cánceraulasaludable
 

Andere mochten auch (14)

Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811
 
19888 annals 2_head
19888 annals 2_head19888 annals 2_head
19888 annals 2_head
 
Project Delivery
Project DeliveryProject Delivery
Project Delivery
 
Session 2: Diagnostics in Africa
Session 2: Diagnostics in AfricaSession 2: Diagnostics in Africa
Session 2: Diagnostics in Africa
 
Summer of Love Festival
Summer of Love FestivalSummer of Love Festival
Summer of Love Festival
 
Danone
DanoneDanone
Danone
 
Can and-could
Can and-couldCan and-could
Can and-could
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Experiencia significativa bosa
Experiencia significativa bosaExperiencia significativa bosa
Experiencia significativa bosa
 
[1] sk kd bina
[1] sk   kd bina[1] sk   kd bina
[1] sk kd bina
 
Las poleas en la física
Las poleas en la física Las poleas en la física
Las poleas en la física
 
L'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterL'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a Chester
 
Follet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialFollet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterial
 
Prevención del cáncer
Prevención del cáncerPrevención del cáncer
Prevención del cáncer
 

Ähnlich wie Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2013)

Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Jason Haislmaier
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Jason Haislmaier
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 septRachel Aldighieri
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Emily Jones
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsJason Haislmaier
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 

Ähnlich wie Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2013) (20)

Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical Considerations
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 

Mehr von Jason Haislmaier

Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Jason Haislmaier
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Jason Haislmaier
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Jason Haislmaier
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Jason Haislmaier
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) Jason Haislmaier
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The CloudJason Haislmaier
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open SourceJason Haislmaier
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For EntrepreneurersJason Haislmaier
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Jason Haislmaier
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Jason Haislmaier
 

Mehr von Jason Haislmaier (10)

Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012)
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The Cloud
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2013)

  • 1. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Copyright 2013 BryanCave LLP May 30, 2013 Jason D. Haislmaier jason.haislmaier@bryancave.com Data “Property” Rights Copyright 2013 BryanCave LLP
  • 2. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP This presentation is intended for general informational purposes only and should not be construed as legal advice or legal opinion on any specific facts or circumstances, nor is it intended to address specific legal compliance issues that may arise in particular circumstances. Please consult counsel concerning your own situation and any specific legal questions you may have. The thoughts and opinions expressed in this presentation are those of the individual presenters and do not necessarily reflect the official or unofficial thoughts or opinions of their employers. For further information regarding this presentation, please contact the presenter(s) listed in the presentation. Unless otherwise noted, all original content in this presentation is licensed under the Creative Commons Creative Commons Attribution-Share Alike 3.0 United States License available at: http://creativecommons.org/licenses/by-sa/3.0/us.
  • 3. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Privacy Security Rights
  • 4. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Increasing importance Increasing value Data
  • 5. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP What “rights” protect data?
  • 6. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP No specific comprehensive legal protection for data or databases in the US
  • 7. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data as Property
  • 8. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP ?Data Rights Data Privacy Data Security Copyright Trade Secret Contract Industry Practice State Law FTC Action
  • 9. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Rights • No specific comprehensive protections under US law • Protection is available through generally applicable legal areas – Copyright – Trade secret – Contract – Other legal theories (but generally limited) • Growing data privacy and security protections are also shaping rights in data – General purpose laws – Industry-specific federal laws – State data security and privacy laws – Increasing federal (and state) enforcement actions In General
  • 10. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Rights • Limited attempts at comprehensive protection exist outside of the US • Focused on data in the form of databases • EU Database Directive (96/9/EC) – Protection for non-original portions of databases not protected by copyright law – Based on the investment in obtaining, verifying, or presenting the contents of the database – Prevents extraction or re-utilization of all or a portion of the contents of a database • Limited examples of analogous laws in other countries as well Protections Outside of the US
  • 11. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Trademarks Branding and Identity Patents Ideas and Inventions Trade Secrets “Know-How” Copyrights Creative Expressions Traditional IP Rights In Data
  • 12. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Traditional IP Rights In Data • Patents – Available to protect databases • Structure • Method of operation • Business methods employing databases – But the databases must meet the criteria for patent protection – Less applicable in the case of unstructured “raw” data • Trademarks – Applicable in connection with the name or brand for a product or service – Not applicable to data or databases themselves Patents and Trademarks
  • 13. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • U.S. copyright law does not provide specific or express protection to data or databases • Copyright protection for data and databases is analyzed like any other work of authorship • The standard for obtaining a copyright is relatively low – Original work of authorship – Fixed in a tangible medium of expression • But, data and databases are not always afforded protection Copyright Traditional IP Rights In Data
  • 14. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP “The vast majority of works make the grade quite easily, as they possess some creative spark, no matter how crude, humble or obvious. ” Justice Sandra Day O’Connor Feist Publications, Inc. v. Rural Telephone Service Co. 499 U.S. 340 (1991) Traditional IP Rights In Data
  • 15. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP “No one may claim originality as to facts [. . .] facts do not owe their origin to an act of authorship. The distinction is one between creation and discovery. The first person to find and report a particular fact has not created the fact; he or she has merely discovered its existence.” Justice O’Connor in Feist Traditional IP Rights In Data
  • 16. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Copyright does not protect data in the form of facts – Originality, not “sweat of the brow,” is the basis for copyright protection – Facts are not originally authored or created through mere discovery • Copyright can protect information or content in the form of original expressions – Information or content having some level of creativity – Entertainment content, new media, UGC may all meet this test – Unstructured raw data in the form of facts will often fail the test • This results in inconsistent protection for data and databases – Unstructured raw data – no protection available – Original information or content having some level of creativity – protection available – Structure, coordination, and arrangement of data – “thin” protection available (for the compilation, but not for the underlying data) Copyright Traditional IP Rights In Data
  • 17. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Nearly all states have adopted some version of the Uniform Trade Secrets Act (UTSA) • Under the UTSA, a “Trade Secret” is information that: – Is not generally known to other persons and cannot be readily ascertained by other persons without improper means – Provides the holder with economic advantage or economic value (in some cases derived from its secrecy) – Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy • Broad potential applicability to data and databases – Virtually any type of data or information – In nearly any form or format • Trade secrets covering data and databases are enforceable as long as the requirements are met Trade Secret Traditional IP Rights In Data
  • 18. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Traditional IP rights provide only limited and inconsistent protections Where to turn? Traditional IP Rights In Data
  • 19. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Emerging as a primary form of protection for data • Permit broad protection, potentially even over data and databases not subject to traditional IP protection • Limited to the entities bound by the contract • Even where traditional IP protection is not available, contracts have become critical to obtaining and clarifying rights in data – Each form of IP has its own rules regarding ownership – Left to applicable law, ownership is often (very) unclear – At best this leaves the potential for confusion – Assignments and licenses are preferred to clarify these rights • Industry expectations have risen with the rising value of data – Contracts required to evidence adequate rights in transactions involving data – Not unlike rights in software itself Contracts Contract Rights in Data
  • 20. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Other sources of protection. . .
  • 21. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Data Privacy Data Security
  • 22. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP No specific comprehensive data privacy or security legislation in the US
  • 23. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • EU Data Protection Directive (95/46/EC) • Regulates the processing of personal data of EU subjects – Broad scope of “personal data” – Restricts processing unless stated conditions are met – Prohibits transfer to countries not offering adequate levels of protection • Requires the member countries to pass consistent laws (more or less) • US Department of Commerce-negotiated “Safe Harbor Principles” enable transfers to US companies – Self-certification regime – Allows US companies to register as compliant – FTC oversight • Proposed overhaul in the works (announced Jan. 25, 2012) Longstanding Comprehensive EU Regulations Data Privacy and Security
  • 24. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • State consumer protection statutes – All 50 states – Prohibitions on “unfair or deceptive” trade practices • Data breach notification statutes – At least 46 states (DC and various US territories) – Notification of state residents (and perhaps regulators) affected by unauthorized access to sensitive personal information • Data safeguards statutes – (Significant) minority of states – Safeguards to secure consumer information from unauthorized access • Data privacy statutes – Online privacy policies covering use and sharing of consumer information – Use of personal information for direct marketing purposes Growing Array of Relevant State Laws Data Privacy and Security
  • 25. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Consumer credit - Fair Credit Reporting Act (FCRA) • Financial services - Gramm Leach Bliley Act (GLBA) • Healthcare providers - Health Insurance Portability and Accountability Act (HIPAA) • Children (under 13) - Children’s Online Privacy Protection Act (COPPA) • Video content - Video Privacy Protection Act • Others statutes covering education, payment processing, etc. Industry-specific Federal Statutes Data Privacy and Security
  • 26. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Federal Trade Commission Act (15 U.S.C. 41, et seq) “Unfair or deceptive acts or practices”
  • 27. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • Trend toward increasing enforcement – More than 45 actions to date – More than 25 in the last 6 years – Many more investigated but not brought • Covering largely electronically stored data and information • Targeting data security as well as data privacy • Increasing trend toward mobile data privacy and security Increasing Activity FTC Enforcement Actions
  • 28. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Emerging Models For Compliance FTC Enforcement Actions
  • 29. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • 20 year term • Cease misrepresentations regarding practices for information security, privacy, confidentiality, and integrity • Conduct assessment of reasonably-foreseeable, material security risks • Establish comprehensive written information security and privacy program • Designate employee(s) to coordinate and be accountable for the program • Implement employee training • Conduct biennial independent third party security and privacy assessments • Implement multiple record-keeping requirements • Implement regular testing, monitoring, and assessment • Undergo periodic reporting and compliance requirements • Impose requirements on service providers Legislation by Consent Decree FTC Enforcement Actions
  • 30. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Not just enforcement. . . Standards Best practices Codes of Conduct
  • 31. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP • We are in an era of increasing data value • Increasing value means greater focus on data rights • We do not have the benefit of strong and comprehensive laws to match • Data “rights” are defined through an increasingly broad array of sources – Traditional IP rights, – Contract protections – Growing data privacy and data security obligations • Understand the protections, understand the inconsistencies • Issues relating to data will only continue to increase (transactions and litigation) Lessons Learned Closing Thoughts
  • 32. Copyright 2012 Bryan CaveCopyright 2013 BryanCave LLP Copyright 2013 BryanCave LLP Thank You. Jason Haislmaier jason.haislmaier@bryancave.com @haislmaier http://www.linkedin.com/in/haislmaier