beyond ccpa
play

Beyond CCPA Melissa Maalouf ZwillGen Kandi Parsons ZwillGen Matt - PowerPoint PPT Presentation

Beyond CCPA Melissa Maalouf ZwillGen Kandi Parsons ZwillGen Matt Scutari Optimizely Jim Trilling Federal Trade Commission (Disclaimer: The views expressed in this presentation are Jims as a FTC staff attorney and do not necessarily


  1. Beyond CCPA Melissa Maalouf ZwillGen Kandi Parsons ZwillGen Matt Scutari Optimizely Jim Trilling Federal Trade Commission (Disclaimer: The views expressed in this presentation are Jim’s as a FTC staff attorney and do not necessarily reflect the views of the Commission or any individual Commissioner )

  2. Agenda • How did we get here? • Structuring and Defining Your Privacy Program • Embedding Core Privacy/Security Principles Into Your Program • Regulatory Predictions and Preparedness • Questions

  3. How Did We Get Here?

  4. Beyond CCPA Previous Privacy Regimes • Traditional view was that there was a class of data called personally identifiable information that identified users on its face, usually by name, contact information, or government identifiers • Laws governing the privacy of personal information were sector-specific • healthcare (HIPAA), finance (GLBA), credit information (FCRA), education (FERPA) and children’s information (COPPA) • State data breach and security laws • Some notice requirements (CALOPPA and Shine the Light) • Regulators used UDAP authority to develop privacy principles for companies outside these regulated spaces

  5. Beyond CCPA May 25, 2018: EU General Data Protection Regulation (GDPR), a comprehensive privacy law with broad territorial scope takes effect, after 8 years of drafts and negotiations • Privacy of personal information across sectors • Related to an identified or identifiable person • Vendor management • Comprehensive data subject rights (access, deletion, rectification) • Transparency • Legal bases for processing data • Rigorous consent • Required risk analysis (DPIA) • Controller/processor distinction

  6. Beyond CCPA Major privacy/security issues make headline news • High profile data breaches • Cambridge Analytica

  7. Beyond CCPA CCPA: closest to a comprehensive law in the US is passed, but as opposed to GDPR, only 3 weeks in the making. Similar to GDPR (access, deletion, transparency) But some key differences: • Applies to data reasonably capable of being associated with a consumer or household • Contains different exceptions to data subject rights • Does not have the concept of a data controller v. data processor • Contains more rigid restrictions on sharing data with third parties for commercial purposes – called “sales” • Does not require “legal bases” for collecting and using data • Do not require same types of comprehensive and robust documentation and recordkeeping

  8. Beyond CCPA What’s Coming Next? • Copycat state laws, or worse, laws with inconsistent requirements? • US federal privacy legislation? • What will it regulate? Collection, use, sharing, all? • How will it interact with/preempt existing laws? • Will there be a private right of action? How broad? • Who will enforce? How does a company future-proof its privacy program to comply with existing rules and also be ready for future rules? • Carefully structure and define your privacy program • Ensure core privacy/security principles are embedded in your program • Predict and prepare for future enforcement trends

  9. Defining Your Privacy Program

  10. What is( n’t ) a Privacy Program? It’s not a legal function… It’s not a compliance function… It’s not a security function…

  11. What is a Privacy Program? A privacy program is your organization’s privacy and data protection quarterback • Privacy / Data Governance • Operations • Culture + Awareness

  12. Governance Governance: Driving cross-functional alignment on decisions with privacy impact • Develop strategy • Facilitate and guide product and business decision making • Document and enforce policies, standards, and procedures

  13. Operations Operations: Implementation and maintenance of processes that resolve issues or manage risk • Track and drive implementation of product and business decisions • Ensure policies don’t go stale and key processes remain efficient and effective

  14. Culture + Awareness Culture: Building a company-wide culture of privacy • Foster company-wide awareness of key privacy concepts • Educate key stakeholders on relevant policies and procedures • Enlist “privacy champions” to help scale your program’s efforts

  15. Organizational Structure No perfect option, but some to consider: • Legal • Security • Product Regardless of where the program sits, your goal should be to become embedded with key product/business partners!

  16. Hiring Privacy Program Managers Three key traits to look for (two out of three is great!): • Privacy subject-matter expertise • Industry/sector expertise • Project management skills Look internally!

  17. Embedding Core Privacy/Security Principles into Your Program

  18. Increase the Value of Privacy Internally • Avoiding risk (e.g., breach, regulatory scrutiny) is one consideration but sound privacy decisions have real business value too! • Examples : • Data minimization can save resources on compliance and access/deletion • Stronger policies can facilitate deals • Transparency reduces upset consumers/customers • A privacy protective approach can create market differentiation or a competitive advantage

  19. Speak the Same Language Get Your Organization on the Same Page, across all levels and roles • Do your engineers, sales reps, and recruiters all know what you mean when you talk about “personal data” or “sale”? (They probably don’t) • Focus culture and awareness efforts to ensure everyone understands one another • Work from the same language and playbook • Align on key definitions with legal and security, and then educate everyone else • Consider privacy by design training (along with some legal training) to help teams understand the basis for what you’re advising/asking • With privacy now a cross-functional task, important to train at all levels • CCPA requires employee training for those that will be receiving/handling access/deletion requests, and GDPR requires general training too

  20. Develop Global Solutions if Possible • While there are many different privacy laws across the globe, most have same core tenants – transparency, consumer choice/rights, data minimization, sound security • Benefit of global solutions • Apply across jurisdictions, products, and time (hopefully) • Require refinement but not overhaul • Easier to operationalize compliance • Free up resources to address areas that are not global • Challenges • Different laws; different requirements • Need to leverage less rigorous elements where possible • Marketing, cookie consent

  21. Data Protection Impact Assessment What is it? • An internal document to help you assess the privacy risks of existing and future products/services, and develop strategies to address such risks How/Why to Make it Global? • DPIAs are only required by the GDPR for certain high- risk processing activities, but…. • Even if not officially required under US law, the DPIA process serves as a key component of privacy and security by design • They don’t have to be lengthy – it is possible to create a lightweight, standardized documentation system for evaluating most privacy decisions where a specific type of DPIA is not required • Great for historical reference and to drive accountability • Drive internal alignment on privacy risks and allow for consistent application of internal privacy/security controls • Flexible if new requirements are adopted; teams will already be habituated to the practice

  22. Global Data Protection Addendum What is it? • A contractual addendum to an agreement that governs the privacy/security obligations of the parties with respect to the processing of personal information • Have one version that can be presented by a vendor to its customers, and one version that a company can present to its downward vendors How/Why to Make it Global? • Required by the GDPR, other global privacy laws (and CCPA requires a written contract with service providers) • Make it global to avoid more amendments! • Carefully tailor scope/definitions to be broad enough to work under various privacy regimes, while also making clear that the DPA only applies to data in scope for each law • Many provisions work across jurisdictions/laws • Use restrictions • Deletion rights • Breach notification and security

  23. Individual Rights What is it? • Many laws contain a variety of rights for individuals with respect to their data – e.g., access, deletion, rectification, objection, portability How/Why to make it global? • Consider working from one playbook with different templates/processes for different jurisdictions • OR, consider whether to apply rights globally so so you do not have to pivot when the next law is adopted • Even if you don’t hold yourself to precise strictures globally (e.g., timelines) • Develop Consumer Dashboards • This can enable customization based on the law • You might offer marketing opt outs in Iowa, access in California and objection to processing in the EU

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend