SlideShare uma empresa Scribd logo
1 de 36
Safe Harbor: A framework for
        US – EU data privacy

           Raymond K. Cunningham, Jr.
              CRM, CA, CDIA+, CIPP/IT
What is Safe Harbor?

• Safe Harbor is a framework providing a bridge
  between the approaches taken by the United
  States and the European Union toward the
  protection of privacy
• Safe Harbor is for corporations and other
  organizations doing business in or with EU
  companies and subsidiaries
• Safe Harbor is voluntary
• Organizations self-certify to the principles of Safe
  Harbor
Safe Harbor

• Because of the implementation of the EU
  Directive on Data Protection in 1998 the transfer
  of personal data to non-EU states was to be
  halted
• In order to bridge the gap the US Department of
  Commerce and the EU Commission developed
  the Safe Harbor program
Why Safe Harbor?
• Privacy in the United States differs
  significantly from Privacy in Europe
• European Privacy is a basic human right
  Everyone has the right to respect for his
  private and family life, his home and his
  correspondence.
               - European convention for the Protection
           of Human Rights and Fundamental freedoms
Privacy in Europe
• Privacy is derived from the
  European Convention on Human
  Rights (1950) Article 8
• Directive on Data Protection
  Directive 95/46/EC was the result
  of 15 years of work to provide an
  EU framework on data protection
Data Protection Directive 95/46/EC

• The directive takes a comprehensive approach to
  privacy: the objectives are to protect individuals
  with respect to processing personal information
  and to ensure the free movement of personal
  information
• Personal data is defined as relating to an
  identifiable person.
• The directive is broad. Storage and retrieval are
  covered in the directive but transmission is not.
Data Protection Directive 95/46/EC

• Article 25 of the EU Directive prohibits any EU
  country from transferring personal data via the
  Internet to, or receiving data from, countries
  deemed to lack "adequate" Internet privacy
  protection.
• The United States is one such country with no
  national laws regarding Internet data privacy
Privacy in the United States
• Privacy has been defined in court
  decisions Roe v. Wade
• Privacy is protected through legislation
  in various areas:
  –HIPAA, COPPA, GLBA
  Privacy and security is also protected
  by self-regulatory initiatives - PCI-DSS
Benefits to Safe Harbor

• All member EU states are bound by the EU
  Commission’s finding of adequacy of SH
• Companies participating will be allowed data
  flows
• Prior approval of member states will be waived
  or automatically granted
• Claims brought by EU citizens will be heard in the
  US (some exceptions may apply)
A Word about Switzerland

• In 2008 the Swiss Federal Act on Data
  Protection (FADP) was modified and a Safe
  Harbor Program instituted
• The Swiss data protection application is
  identical to EU Safe harbor form and the
  process is also similar but it is separate
Safe Harbor Principles

•   Notice
•   Choice
•   Onward Transfer
•   Security
•   Data Integrity
•   Access
•   Enforcement
Safe Harbor Principles: Notice

• Organizations must provide a clear and
  conspicuous notice
• The information’s purpose and how it will
  be used must be stated
• A contact for questions or complaints
• Individuals must be told the types of third
  parties data is to be disclosed
Safe Harbor Principles: Choice
• The organization must give the opportunity for
  individuals to opt-out when:
  – Their information is transferred to a third party
  – Their information is used for a purpose for which it
    was not originally collected
• Mechanisms must be in place to exercise choice
Safe Harbor Principles: Choice

• People must be given affirmative or explicit
  opt-in choice if the following information is
  to be divulged to a third party
   –PII or PHI
   –For racial, ethnic, political opinions,
    religious or philosophical beliefs, trade
    union membership, sexual orientation
Choice – Explicit Opt-in
• Explicit opt-in gives the recipient a clear
  understanding of the process of opting-in or
  opting-out
• Opt-in – to request a service, single click
• Confirmed Opt-in – Confirmation email sent
  allowing them to unsubscribe
• Double Opt-in – Confirmation email sent and
  they must reconfirm
Safe Harbor Principles:
               Onward Transfer

• To disclose to a third party must apply the
  Notice and Choice principles.
• The organization MUST ascertain that the
  receiving party subscribes to the principles.
Safe Harbor Principles: Security
• Organizations must take reasonable
  precautions to protect information
  from loss, misuse, unauthorized
  access, disclosure, alteration and
  destruction
• Similar to PCI-DSS and GLBA
• ISO/IEC 27002 is a best practice
  formerly 17799
Safe Harbor Principles:
                    Data Integrity
• Personal information must be relevant for the
  purposes for which it is used
• An organization must not process information in
  a way that is incompatible with the purpose for
  which it has been collected or authorized by the
  individual
• Organizations should take reasonable steps to
  ensure that the data is reliable for its intended
  use, accurate, complete, and current
Safe Harbor Principles: Access

Individuals must have access to
personal information about them that
an organization holds and be able to
correct, amend, or delete that
information where it is inaccurate
Safe Harbor Principles: Access

EXCEPT where the burden or expense of
providing access would be disproportionate to
the risks to the individual’s privacy in the case in
question, or where the rights of persons other
than the individual would be violated.
Safe Harbor: Enforcement
• Enforcement mechanisms must include:
  – Readily available and affordable independent
    recourse mechanisms by which disputes are
    investigated and resolved and damages awarded
  – Follow up procedures for verifying that the
    organization makes about their privacy practices are
    true, the policies implemented as presented
  – Obligations to remedy problems arising out of failure
    to comply with the principles
  – Sanctions must be sufficiently rigorous to ensure
    compliance
Safe Harbor
• Self-assessment (in-house)
  – Maintain documentation
  – Have documentation available
  – Employee training
  – Conduct regular audits
• Outsource compliance review
  – Random reviews for compliance
  – Statements of compliance verification
  – All documents should be available upon request
Certification of Compliance
Safe Harbor: Enforcement
• The FTC is committed to reviewing referrals from
  privacy self-regulatory organizations such as
  BBBOnline and Truste.
• The FTC maintains a list of Safe Harbor
  companies on the web
• Member states alleging non-compliance can use
  the FTC’s Section 5 prohibiting unfair or
  deceptive acts
• The FTC may obtain civil penalties
Enforcement
• Fact: From November 2000 to 2009 NO
  actions were taken
• In November 2009 six companies were
  sanctioned and an injunction ordered
  against another
• Balls of Kryptonite, LLC was misleading
  customers stating self-certification
Important!

• Whatever you put into a Privacy
  Statement you must conform to the
  statement.
• Designate a point of contact to handle
  questions
• Keep your certification current!
Records Managers
• Records Managers are front-line players in
  privacy/security
• Records retention is directly tied to privacy
• Records access is directly tied to security
• Records managers in your organization should
  have some oversight role
• In 2006 the DPA condemned the retention of
  telecomm data on security grounds in response
  to the London and Madrid bombings
FAQ – Some Questions
• How do organizations provide for verifications
  that the attestations and assertions they make
  are being followed in accordance with the Safe
  Harbor Principles?
• Documenting the Self-assessment or having an
  outside firm audit the principles.
FAQ – Some Questions
• How does the Access Principle apply to
  Human Resources records?
• Safe Harbor requires that an organization
  processing such data in the US will
  cooperate in providing access either
  directly or through the EU employer.
FAQ – Some Questions
• What about data transferred to the US for data
  processing only?
• Data controllers in the EU are always required to
  enter into a contract. Data protection is always a
  key element to outsourced data storage or
  processing.
• Principles would not necessarily apply depending
  on the work to be done.
Pharma and Medical Products
• Do member states laws apply to personal
  medical data collected in the EU transferred to
  the USA?
  – Safe harbor principles apply after the transfer to the
    US. Anonymize data where appropriate
• What happens to an individual’s data if a
  participant decides to withdraw from a clinical
  trial?
  – Data collected previous to the withdraw; may be
    processed if it was made clear to the participant in
    the notice.
How much will it cost?

• Fees are $200 certifying for the first time
• Recertification is $100
• Payments are made to the Department of
  Commerce
• This is exclusive of fees to third parties for
  compliance
What is the Future?
•   The EU Directive is being rewritten (Dec. 2011)
•   The right to be forgotten
•   Data protection officers
•   Certification and seal programs
•   Breach Notifications
•   Data protection impact statements
•   Consent
•   New European Data Protection Board
What is the Future?

• The Right to be Forgotten
  – Adults should not be made to live in perpetuity with
    data they posted during a less mature point in their
    lives
• Breach Notification
  – Data controllers will be required to notify supervisory
    authority without undue delay – within 24 hours
Resources


• http://safeharbor.export.gov/list.aspx
• International Association of Privacy Professionals
  (IAPP) Sign up for free daily newsletter
• Federal Trade Commission (FTC)
• AICPA
Contact Ray Cunningham
cunningham@uif.uillinois.edu
      217 244-0658

Mais conteúdo relacionado

Mais procurados

Trademark infringement
Trademark infringementTrademark infringement
Trademark infringementmanishapant10
 
TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.Rajiv Mandal
 
Assignment of trademarks
Assignment of trademarksAssignment of trademarks
Assignment of trademarksAltacit Global
 
Design registration ip india pdf
Design registration ip india pdfDesign registration ip india pdf
Design registration ip india pdfAnshika Bhardwaj
 
Trademark Licensing in India
Trademark Licensing in IndiaTrademark Licensing in India
Trademark Licensing in IndiaManish Kumar
 
Bobby art international
Bobby art internationalBobby art international
Bobby art internationalKrunal Varia
 
Brussels Satellite convention,1974
Brussels Satellite convention,1974Brussels Satellite convention,1974
Brussels Satellite convention,1974Saravanan A
 
MEANING & CONCEPT OF immovable property
MEANING & CONCEPT OF immovable propertyMEANING & CONCEPT OF immovable property
MEANING & CONCEPT OF immovable propertyTejinder Bhatti
 
Case study on trademark infringement
Case study on trademark infringementCase study on trademark infringement
Case study on trademark infringementShilpa Rathod
 
Sale Of Goods Act Ppt
Sale Of Goods Act PptSale Of Goods Act Ppt
Sale Of Goods Act PptNishit Mehta
 
L.Chandra Kumar v. Union of India
L.Chandra Kumar v. Union of IndiaL.Chandra Kumar v. Union of India
L.Chandra Kumar v. Union of IndiaPriyanka Singh
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsAnirudh Pandey
 
Transfer of property act definitions
Transfer of property act definitionsTransfer of property act definitions
Transfer of property act definitionsDr. Vikas Khakare
 

Mais procurados (20)

Trademark infringement
Trademark infringementTrademark infringement
Trademark infringement
 
TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.
 
Easement rights
Easement rightsEasement rights
Easement rights
 
Assignment of trademarks
Assignment of trademarksAssignment of trademarks
Assignment of trademarks
 
Design registration ip india pdf
Design registration ip india pdfDesign registration ip india pdf
Design registration ip india pdf
 
Trademark Licensing in India
Trademark Licensing in IndiaTrademark Licensing in India
Trademark Licensing in India
 
Bobby art international
Bobby art internationalBobby art international
Bobby art international
 
Brussels Satellite convention,1974
Brussels Satellite convention,1974Brussels Satellite convention,1974
Brussels Satellite convention,1974
 
MEANING & CONCEPT OF immovable property
MEANING & CONCEPT OF immovable propertyMEANING & CONCEPT OF immovable property
MEANING & CONCEPT OF immovable property
 
Subject matter of copyright law
Subject matter of copyright lawSubject matter of copyright law
Subject matter of copyright law
 
Case study on trademark infringement
Case study on trademark infringementCase study on trademark infringement
Case study on trademark infringement
 
Sale Of Goods Act Ppt
Sale Of Goods Act PptSale Of Goods Act Ppt
Sale Of Goods Act Ppt
 
L.Chandra Kumar v. Union of India
L.Chandra Kumar v. Union of IndiaL.Chandra Kumar v. Union of India
L.Chandra Kumar v. Union of India
 
Copyright socities
Copyright socitiesCopyright socities
Copyright socities
 
tulk v moxhay
tulk v moxhaytulk v moxhay
tulk v moxhay
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Trademark shraddha singhi
Trademark shraddha singhiTrademark shraddha singhi
Trademark shraddha singhi
 
PPT design act.pdf
PPT design act.pdfPPT design act.pdf
PPT design act.pdf
 
Indian limitation act 1963
Indian limitation act 1963Indian limitation act 1963
Indian limitation act 1963
 
Transfer of property act definitions
Transfer of property act definitionsTransfer of property act definitions
Transfer of property act definitions
 

Destaque

Future of the ICT is now!
Future of the ICT is now!Future of the ICT is now!
Future of the ICT is now!Tomo Popovic
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the PitfallsBeginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the PitfallsRaymond Cunningham
 
The solar system of ainara
The solar system of ainaraThe solar system of ainara
The solar system of ainarafirstbilingual1
 
Matthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the foxMatthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the foxtherussianbear
 
BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016Dafne Patruno
 
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...Jeremy Gibberd
 
Sinopsis bab 12
Sinopsis bab 12Sinopsis bab 12
Sinopsis bab 12ayu227
 
St patrick's gac juvenile presentation nov10 reducedsize[1]
St  patrick's gac juvenile presentation nov10 reducedsize[1]St  patrick's gac juvenile presentation nov10 reducedsize[1]
St patrick's gac juvenile presentation nov10 reducedsize[1]ddrayne
 
Sinposis bab 11
Sinposis bab 11Sinposis bab 11
Sinposis bab 11ayu227
 
Csis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 pptCsis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 pptHamdani Nurdin
 
專題報告
專題報告專題報告
專題報告helen1398
 
Employers for Better Health
Employers for Better HealthEmployers for Better Health
Employers for Better HealthOttawa Kent
 
Antisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia SmithAntisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia Smithcheloina
 

Destaque (20)

Future of the ICT is now!
Future of the ICT is now!Future of the ICT is now!
Future of the ICT is now!
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the PitfallsBeginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls
 
Saturno
SaturnoSaturno
Saturno
 
Proyecto solar system
Proyecto solar systemProyecto solar system
Proyecto solar system
 
The solar system of ainara
The solar system of ainaraThe solar system of ainara
The solar system of ainara
 
Matthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the foxMatthew millington is the fox and you can't catch the fox
Matthew millington is the fox and you can't catch the fox
 
Las estaciones del año
Las estaciones del añoLas estaciones del año
Las estaciones del año
 
BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016BcnCoolHunter N8 Mayo 2016
BcnCoolHunter N8 Mayo 2016
 
Papercrafts 1ºd
Papercrafts 1ºdPapercrafts 1ºd
Papercrafts 1ºd
 
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
Neighbourhood Facilities for Sustainability: Short Cuts to Sustainable Settle...
 
Sinopsis bab 12
Sinopsis bab 12Sinopsis bab 12
Sinopsis bab 12
 
9fms pp18
9fms pp189fms pp18
9fms pp18
 
St patrick's gac juvenile presentation nov10 reducedsize[1]
St  patrick's gac juvenile presentation nov10 reducedsize[1]St  patrick's gac juvenile presentation nov10 reducedsize[1]
St patrick's gac juvenile presentation nov10 reducedsize[1]
 
Sinposis bab 11
Sinposis bab 11Sinposis bab 11
Sinposis bab 11
 
Csis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 pptCsis 1514 excel ch 1 ppt
Csis 1514 excel ch 1 ppt
 
專題報告
專題報告專題報告
專題報告
 
Employers for Better Health
Employers for Better HealthEmployers for Better Health
Employers for Better Health
 
Pregrado
PregradoPregrado
Pregrado
 
Presentaciónvenus
PresentaciónvenusPresentaciónvenus
Presentaciónvenus
 
Antisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia SmithAntisocial Personality Disorder Schalonia Smith
Antisocial Personality Disorder Schalonia Smith
 

Semelhante a Safe Harbor: A framework for US – EU data privacy

Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Kimberly Verska
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareWinston & Strawn LLP
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protectionRachel Aldighieri
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015Rachel Aldighieri
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15Rachel Aldighieri
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMichelleSaver
 
The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...Browne Jacobson LLP
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterBrowne Jacobson LLP
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researcherskclcompbio
 

Semelhante a Safe Harbor: A framework for US – EU data privacy (20)

Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To Prepare
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...The Information Commissioner calls - what to expect and how to react, May 201...
The Information Commissioner calls - what to expect and how to react, May 201...
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Public sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, ExeterPublic sector breakfast club - October 2017, Exeter
Public sector breakfast club - October 2017, Exeter
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 

Mais de Raymond Cunningham

Brick Streets in Homer Illinois
Brick Streets in Homer IllinoisBrick Streets in Homer Illinois
Brick Streets in Homer IllinoisRaymond Cunningham
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Document Imaging Basics for Campus Departments
Document Imaging Basics for Campus DepartmentsDocument Imaging Basics for Campus Departments
Document Imaging Basics for Campus DepartmentsRaymond Cunningham
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...Raymond Cunningham
 
Continuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIMContinuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIMRaymond Cunningham
 
Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity Raymond Cunningham
 

Mais de Raymond Cunningham (8)

The cult of kim jong
The cult of kim jongThe cult of kim jong
The cult of kim jong
 
Brick Streets in Homer Illinois
Brick Streets in Homer IllinoisBrick Streets in Homer Illinois
Brick Streets in Homer Illinois
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Document Imaging Basics for Campus Departments
Document Imaging Basics for Campus DepartmentsDocument Imaging Basics for Campus Departments
Document Imaging Basics for Campus Departments
 
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
Beginning an Imaging Program: Achieving Success and Avoiding the Pitfalls – A...
 
Continuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIMContinuing Education: Building a Career Path in RIM
Continuing Education: Building a Career Path in RIM
 
Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity Document Imaging Technology: Increasing Business Productivity
Document Imaging Technology: Increasing Business Productivity
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Safe Harbor: A framework for US – EU data privacy

  • 1. Safe Harbor: A framework for US – EU data privacy Raymond K. Cunningham, Jr. CRM, CA, CDIA+, CIPP/IT
  • 2. What is Safe Harbor? • Safe Harbor is a framework providing a bridge between the approaches taken by the United States and the European Union toward the protection of privacy • Safe Harbor is for corporations and other organizations doing business in or with EU companies and subsidiaries • Safe Harbor is voluntary • Organizations self-certify to the principles of Safe Harbor
  • 3. Safe Harbor • Because of the implementation of the EU Directive on Data Protection in 1998 the transfer of personal data to non-EU states was to be halted • In order to bridge the gap the US Department of Commerce and the EU Commission developed the Safe Harbor program
  • 4. Why Safe Harbor? • Privacy in the United States differs significantly from Privacy in Europe • European Privacy is a basic human right Everyone has the right to respect for his private and family life, his home and his correspondence. - European convention for the Protection of Human Rights and Fundamental freedoms
  • 5. Privacy in Europe • Privacy is derived from the European Convention on Human Rights (1950) Article 8 • Directive on Data Protection Directive 95/46/EC was the result of 15 years of work to provide an EU framework on data protection
  • 6. Data Protection Directive 95/46/EC • The directive takes a comprehensive approach to privacy: the objectives are to protect individuals with respect to processing personal information and to ensure the free movement of personal information • Personal data is defined as relating to an identifiable person. • The directive is broad. Storage and retrieval are covered in the directive but transmission is not.
  • 7. Data Protection Directive 95/46/EC • Article 25 of the EU Directive prohibits any EU country from transferring personal data via the Internet to, or receiving data from, countries deemed to lack "adequate" Internet privacy protection. • The United States is one such country with no national laws regarding Internet data privacy
  • 8. Privacy in the United States • Privacy has been defined in court decisions Roe v. Wade • Privacy is protected through legislation in various areas: –HIPAA, COPPA, GLBA Privacy and security is also protected by self-regulatory initiatives - PCI-DSS
  • 9. Benefits to Safe Harbor • All member EU states are bound by the EU Commission’s finding of adequacy of SH • Companies participating will be allowed data flows • Prior approval of member states will be waived or automatically granted • Claims brought by EU citizens will be heard in the US (some exceptions may apply)
  • 10. A Word about Switzerland • In 2008 the Swiss Federal Act on Data Protection (FADP) was modified and a Safe Harbor Program instituted • The Swiss data protection application is identical to EU Safe harbor form and the process is also similar but it is separate
  • 11. Safe Harbor Principles • Notice • Choice • Onward Transfer • Security • Data Integrity • Access • Enforcement
  • 12. Safe Harbor Principles: Notice • Organizations must provide a clear and conspicuous notice • The information’s purpose and how it will be used must be stated • A contact for questions or complaints • Individuals must be told the types of third parties data is to be disclosed
  • 13. Safe Harbor Principles: Choice • The organization must give the opportunity for individuals to opt-out when: – Their information is transferred to a third party – Their information is used for a purpose for which it was not originally collected • Mechanisms must be in place to exercise choice
  • 14. Safe Harbor Principles: Choice • People must be given affirmative or explicit opt-in choice if the following information is to be divulged to a third party –PII or PHI –For racial, ethnic, political opinions, religious or philosophical beliefs, trade union membership, sexual orientation
  • 15. Choice – Explicit Opt-in • Explicit opt-in gives the recipient a clear understanding of the process of opting-in or opting-out • Opt-in – to request a service, single click • Confirmed Opt-in – Confirmation email sent allowing them to unsubscribe • Double Opt-in – Confirmation email sent and they must reconfirm
  • 16. Safe Harbor Principles: Onward Transfer • To disclose to a third party must apply the Notice and Choice principles. • The organization MUST ascertain that the receiving party subscribes to the principles.
  • 17. Safe Harbor Principles: Security • Organizations must take reasonable precautions to protect information from loss, misuse, unauthorized access, disclosure, alteration and destruction • Similar to PCI-DSS and GLBA • ISO/IEC 27002 is a best practice formerly 17799
  • 18. Safe Harbor Principles: Data Integrity • Personal information must be relevant for the purposes for which it is used • An organization must not process information in a way that is incompatible with the purpose for which it has been collected or authorized by the individual • Organizations should take reasonable steps to ensure that the data is reliable for its intended use, accurate, complete, and current
  • 19. Safe Harbor Principles: Access Individuals must have access to personal information about them that an organization holds and be able to correct, amend, or delete that information where it is inaccurate
  • 20. Safe Harbor Principles: Access EXCEPT where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy in the case in question, or where the rights of persons other than the individual would be violated.
  • 21. Safe Harbor: Enforcement • Enforcement mechanisms must include: – Readily available and affordable independent recourse mechanisms by which disputes are investigated and resolved and damages awarded – Follow up procedures for verifying that the organization makes about their privacy practices are true, the policies implemented as presented – Obligations to remedy problems arising out of failure to comply with the principles – Sanctions must be sufficiently rigorous to ensure compliance
  • 22. Safe Harbor • Self-assessment (in-house) – Maintain documentation – Have documentation available – Employee training – Conduct regular audits • Outsource compliance review – Random reviews for compliance – Statements of compliance verification – All documents should be available upon request
  • 24. Safe Harbor: Enforcement • The FTC is committed to reviewing referrals from privacy self-regulatory organizations such as BBBOnline and Truste. • The FTC maintains a list of Safe Harbor companies on the web • Member states alleging non-compliance can use the FTC’s Section 5 prohibiting unfair or deceptive acts • The FTC may obtain civil penalties
  • 25. Enforcement • Fact: From November 2000 to 2009 NO actions were taken • In November 2009 six companies were sanctioned and an injunction ordered against another • Balls of Kryptonite, LLC was misleading customers stating self-certification
  • 26. Important! • Whatever you put into a Privacy Statement you must conform to the statement. • Designate a point of contact to handle questions • Keep your certification current!
  • 27. Records Managers • Records Managers are front-line players in privacy/security • Records retention is directly tied to privacy • Records access is directly tied to security • Records managers in your organization should have some oversight role • In 2006 the DPA condemned the retention of telecomm data on security grounds in response to the London and Madrid bombings
  • 28. FAQ – Some Questions • How do organizations provide for verifications that the attestations and assertions they make are being followed in accordance with the Safe Harbor Principles? • Documenting the Self-assessment or having an outside firm audit the principles.
  • 29. FAQ – Some Questions • How does the Access Principle apply to Human Resources records? • Safe Harbor requires that an organization processing such data in the US will cooperate in providing access either directly or through the EU employer.
  • 30. FAQ – Some Questions • What about data transferred to the US for data processing only? • Data controllers in the EU are always required to enter into a contract. Data protection is always a key element to outsourced data storage or processing. • Principles would not necessarily apply depending on the work to be done.
  • 31. Pharma and Medical Products • Do member states laws apply to personal medical data collected in the EU transferred to the USA? – Safe harbor principles apply after the transfer to the US. Anonymize data where appropriate • What happens to an individual’s data if a participant decides to withdraw from a clinical trial? – Data collected previous to the withdraw; may be processed if it was made clear to the participant in the notice.
  • 32. How much will it cost? • Fees are $200 certifying for the first time • Recertification is $100 • Payments are made to the Department of Commerce • This is exclusive of fees to third parties for compliance
  • 33. What is the Future? • The EU Directive is being rewritten (Dec. 2011) • The right to be forgotten • Data protection officers • Certification and seal programs • Breach Notifications • Data protection impact statements • Consent • New European Data Protection Board
  • 34. What is the Future? • The Right to be Forgotten – Adults should not be made to live in perpetuity with data they posted during a less mature point in their lives • Breach Notification – Data controllers will be required to notify supervisory authority without undue delay – within 24 hours
  • 35. Resources • http://safeharbor.export.gov/list.aspx • International Association of Privacy Professionals (IAPP) Sign up for free daily newsletter • Federal Trade Commission (FTC) • AICPA