SlideShare uma empresa Scribd logo
1 de 13
Pushing Product Online - Blogs, Bugs & Behavioral Ads Glenn Manishin & Jonathan Armstrong Duane Morris LLP 12th August 2010
United States FTC rules the domain, without rules Website privacy policies Endorsement guidelines Feb. ‘07/09 Staff Reports re behavioral advertising “Do Not Track” list House Bi-Partisan Privacy Caucus inquiry (Markey, Barton) Privacy legislation—BEST PRACTICES Act (H.R. 5777)
Legal Issues CFAA, ECPA/SCA Invasion of Privacy Act (Cal. Penal Code § 631) FTC COPPA review (“sensitive” and children’s data) Antitrust (Google/AdMob, etc.) Spyware and DPI, e.g., Valentine v. NebuAd, No. CV-08-5113 (N.D. Calif.).
Battlegrounds	 IAB self-regulation, CDD complaint Dueling House bills (Reps. Boucher/Stearns v. Rush) Wall Street Journal expose 4 Aug. 2010 On the Web's Cutting Edge, Anonymity in Name Only DoC Internet Policy Task Force (NOI) State legislation/preemption, e.g., 2009 New York S.B. 616
Resources FTC Staff Report — http://ow.ly/2m3mI CDD complaint —  http://ow.ly/2m3KH WSJ series —  http://ow.ly/2m4lw BEST PRACTICES Act —  http://ow.ly/2m4Fe Commerce Dept. Internet Policy Task Force —  http://www.ntia.doc.gov/internetpolicytaskforce
Europe New EU Directive passed Nov 2009 Article 29 WP Opinion June 2010 Opt out not enough Must be informed consent ‘simple and effective mechanisms’ No behavioural ads to children
UK OFT ICO OFCOM ASA
UK existing law Data Protection Act 1998 Privacy and Electronic Communications (EC Directive) Regulations 2003 Consumer Protection from Unfair Trading Regulations 2008
OFT Market Study published in May Close working with IAB Clear notices and opt-in ICO prosecutions Use of fair trading laws
ICO Consultation New Code of Practice July 2010 Special effort on ‘behind the scenes’ processing e.g. airline pricing ‘simple means of disabling’ Recognition of the role of browser
Resources Computer Weekly – www.tinyurl.com/jpa012 Webcasts - www.tinyurl.com/jpa007 ICO Code of Practice – www.tinyurl.com/jpa020 OFT – www.tinyurl.com/jpa019
Questions ,[object Object]

Mais conteúdo relacionado

Destaque

Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...
Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...
Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...Giuseppe Mascolo
 
The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...
The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...
The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...Glenn Manishin
 
Net Neutrality & Broadband "Reclassification"
Net Neutrality & Broadband "Reclassification"Net Neutrality & Broadband "Reclassification"
Net Neutrality & Broadband "Reclassification"Glenn Manishin
 
Eastern State Penn
Eastern State PennEastern State Penn
Eastern State Pennguest0829cc
 
Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)
Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)
Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)Glenn Manishin
 
Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)Glenn Manishin
 
Loren Data v. GXS Inc. (4th Cir. 2012)
Loren Data v. GXS Inc. (4th Cir. 2012)Loren Data v. GXS Inc. (4th Cir. 2012)
Loren Data v. GXS Inc. (4th Cir. 2012)Glenn Manishin
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Indi Adressing Final
Indi Adressing FinalIndi Adressing Final
Indi Adressing Finalmikemd115
 
Google glass workshop jong professionals event TVVL January 2015
Google glass workshop jong professionals event TVVL January 2015Google glass workshop jong professionals event TVVL January 2015
Google glass workshop jong professionals event TVVL January 2015Jurjen de Vries
 
Communications Act Preemption (CMRS)
Communications Act Preemption (CMRS)Communications Act Preemption (CMRS)
Communications Act Preemption (CMRS)Glenn Manishin
 
Appraising Microsoft II
Appraising Microsoft IIAppraising Microsoft II
Appraising Microsoft IIGlenn Manishin
 
Projet Megas - Livrable 3 - Soutenance orale
Projet Megas - Livrable 3 - Soutenance oraleProjet Megas - Livrable 3 - Soutenance orale
Projet Megas - Livrable 3 - Soutenance oralechauchse
 
Alphorm.com Formation JavaFX
Alphorm.com Formation JavaFXAlphorm.com Formation JavaFX
Alphorm.com Formation JavaFXAlphorm
 

Destaque (19)

Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...
Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...
Campagna non convenzionale per la Mostra Internazionale del Nuovo Cinema di P...
 
The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...
The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...
The Politics of Bandwidth: Convergence, Globalization and the Future of Telec...
 
Net Neutrality & Broadband "Reclassification"
Net Neutrality & Broadband "Reclassification"Net Neutrality & Broadband "Reclassification"
Net Neutrality & Broadband "Reclassification"
 
Eastern State Penn
Eastern State PennEastern State Penn
Eastern State Penn
 
Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)
Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)
Sports Fans Coalition Petition (Comcast/Time Warner Cable merger)
 
Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)
 
Loren Data v. GXS Inc. (4th Cir. 2012)
Loren Data v. GXS Inc. (4th Cir. 2012)Loren Data v. GXS Inc. (4th Cir. 2012)
Loren Data v. GXS Inc. (4th Cir. 2012)
 
Sample Ppt Ilkin
Sample Ppt IlkinSample Ppt Ilkin
Sample Ppt Ilkin
 
Eighth Grade Moments Sls
Eighth Grade Moments SlsEighth Grade Moments Sls
Eighth Grade Moments Sls
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Copa 2002 Noticias
Copa 2002   NoticiasCopa 2002   Noticias
Copa 2002 Noticias
 
Indi Adressing Final
Indi Adressing FinalIndi Adressing Final
Indi Adressing Final
 
Google glass workshop jong professionals event TVVL January 2015
Google glass workshop jong professionals event TVVL January 2015Google glass workshop jong professionals event TVVL January 2015
Google glass workshop jong professionals event TVVL January 2015
 
Communications Act Preemption (CMRS)
Communications Act Preemption (CMRS)Communications Act Preemption (CMRS)
Communications Act Preemption (CMRS)
 
81 Reasons2 Connect Ppt
81 Reasons2 Connect Ppt81 Reasons2 Connect Ppt
81 Reasons2 Connect Ppt
 
Appraising Microsoft II
Appraising Microsoft IIAppraising Microsoft II
Appraising Microsoft II
 
Von.x Antitrust Panel
Von.x Antitrust PanelVon.x Antitrust Panel
Von.x Antitrust Panel
 
Projet Megas - Livrable 3 - Soutenance orale
Projet Megas - Livrable 3 - Soutenance oraleProjet Megas - Livrable 3 - Soutenance orale
Projet Megas - Livrable 3 - Soutenance orale
 
Alphorm.com Formation JavaFX
Alphorm.com Formation JavaFXAlphorm.com Formation JavaFX
Alphorm.com Formation JavaFX
 

Semelhante a EU-US Behavioral Ad Legal Trends

Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11TeamOneI1MBA11
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012Vivastream
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 PrivacyLance Hoffman
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...DDMA
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesShawn Tuma
 
New Data Protection Laws and Case Law Trends in Central & South America
New Data Protection Laws and Case Law Trends in Central & South AmericaNew Data Protection Laws and Case Law Trends in Central & South America
New Data Protection Laws and Case Law Trends in Central & South AmericaCédric Laurant
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsInternet Law Center
 
Ict Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsIct Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsCharles Mok
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunitiesmorganjbruce
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010mleyden
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)Andy Polesovsky
 
Google viacom-kids-cookie-tracking
Google viacom-kids-cookie-trackingGoogle viacom-kids-cookie-tracking
Google viacom-kids-cookie-trackingGreg Sterling
 

Semelhante a EU-US Behavioral Ad Legal Trends (20)

Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
 
PLI Can Spam
PLI Can SpamPLI Can Spam
PLI Can Spam
 
New Data Protection Laws and Case Law Trends in Central & South America
New Data Protection Laws and Case Law Trends in Central & South AmericaNew Data Protection Laws and Case Law Trends in Central & South America
New Data Protection Laws and Case Law Trends in Central & South America
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial Communications
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Ict Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsIct Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & Trends
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunities
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010
 
Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)
 
Google viacom-kids-cookie-tracking
Google viacom-kids-cookie-trackingGoogle viacom-kids-cookie-tracking
Google viacom-kids-cookie-tracking
 

Mais de Glenn Manishin

Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)
Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)
Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)Glenn Manishin
 
Stay Reply Memo (D.C. Circuit)
Stay Reply Memo (D.C. Circuit)Stay Reply Memo (D.C. Circuit)
Stay Reply Memo (D.C. Circuit)Glenn Manishin
 
Motion to Stay FCC's Incentive Spectrum Auction
Motion to Stay FCC's Incentive Spectrum AuctionMotion to Stay FCC's Incentive Spectrum Auction
Motion to Stay FCC's Incentive Spectrum AuctionGlenn Manishin
 
Manishin stafford slides (pp show)
Manishin stafford slides (pp show)Manishin stafford slides (pp show)
Manishin stafford slides (pp show)Glenn Manishin
 
Tribune Co. v. FCC -- Consumers Brief
Tribune Co. v. FCC -- Consumers BriefTribune Co. v. FCC -- Consumers Brief
Tribune Co. v. FCC -- Consumers BriefGlenn Manishin
 
The Antitrust-IP Interface
The Antitrust-IP InterfaceThe Antitrust-IP Interface
The Antitrust-IP InterfaceGlenn Manishin
 

Mais de Glenn Manishin (7)

Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)
Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)
Opening Brief, Free Access v. FCC, No. 16 1100 (D.C. Cir.)
 
Stay Reply Memo (D.C. Circuit)
Stay Reply Memo (D.C. Circuit)Stay Reply Memo (D.C. Circuit)
Stay Reply Memo (D.C. Circuit)
 
Motion to Stay FCC's Incentive Spectrum Auction
Motion to Stay FCC's Incentive Spectrum AuctionMotion to Stay FCC's Incentive Spectrum Auction
Motion to Stay FCC's Incentive Spectrum Auction
 
Manishin stafford slides (pp show)
Manishin stafford slides (pp show)Manishin stafford slides (pp show)
Manishin stafford slides (pp show)
 
Tribune Co. v. FCC -- Consumers Brief
Tribune Co. v. FCC -- Consumers BriefTribune Co. v. FCC -- Consumers Brief
Tribune Co. v. FCC -- Consumers Brief
 
Ftc privacy comments
Ftc privacy commentsFtc privacy comments
Ftc privacy comments
 
The Antitrust-IP Interface
The Antitrust-IP InterfaceThe Antitrust-IP Interface
The Antitrust-IP Interface
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

EU-US Behavioral Ad Legal Trends

  • 1. Pushing Product Online - Blogs, Bugs & Behavioral Ads Glenn Manishin & Jonathan Armstrong Duane Morris LLP 12th August 2010
  • 2.
  • 3. United States FTC rules the domain, without rules Website privacy policies Endorsement guidelines Feb. ‘07/09 Staff Reports re behavioral advertising “Do Not Track” list House Bi-Partisan Privacy Caucus inquiry (Markey, Barton) Privacy legislation—BEST PRACTICES Act (H.R. 5777)
  • 4. Legal Issues CFAA, ECPA/SCA Invasion of Privacy Act (Cal. Penal Code § 631) FTC COPPA review (“sensitive” and children’s data) Antitrust (Google/AdMob, etc.) Spyware and DPI, e.g., Valentine v. NebuAd, No. CV-08-5113 (N.D. Calif.).
  • 5. Battlegrounds IAB self-regulation, CDD complaint Dueling House bills (Reps. Boucher/Stearns v. Rush) Wall Street Journal expose 4 Aug. 2010 On the Web's Cutting Edge, Anonymity in Name Only DoC Internet Policy Task Force (NOI) State legislation/preemption, e.g., 2009 New York S.B. 616
  • 6. Resources FTC Staff Report — http://ow.ly/2m3mI CDD complaint — http://ow.ly/2m3KH WSJ series — http://ow.ly/2m4lw BEST PRACTICES Act — http://ow.ly/2m4Fe Commerce Dept. Internet Policy Task Force — http://www.ntia.doc.gov/internetpolicytaskforce
  • 7. Europe New EU Directive passed Nov 2009 Article 29 WP Opinion June 2010 Opt out not enough Must be informed consent ‘simple and effective mechanisms’ No behavioural ads to children
  • 8. UK OFT ICO OFCOM ASA
  • 9. UK existing law Data Protection Act 1998 Privacy and Electronic Communications (EC Directive) Regulations 2003 Consumer Protection from Unfair Trading Regulations 2008
  • 10. OFT Market Study published in May Close working with IAB Clear notices and opt-in ICO prosecutions Use of fair trading laws
  • 11. ICO Consultation New Code of Practice July 2010 Special effort on ‘behind the scenes’ processing e.g. airline pricing ‘simple means of disabling’ Recognition of the role of browser
  • 12. Resources Computer Weekly – www.tinyurl.com/jpa012 Webcasts - www.tinyurl.com/jpa007 ICO Code of Practice – www.tinyurl.com/jpa020 OFT – www.tinyurl.com/jpa019
  • 13.

Notas do Editor

  1. Voluntary “privacy policies” but deceptive trade practice not to followEndorsement guidelines apply to sponsored posts/blogs, but no statutory penaltiesNo Not Track legislation died in 2007Leibowitz June ’10 Senate Commerce testimony: "To this end, one idea we may explore in the context of behavioral advertising is a do-not-track mechanism that's more comprehensive and easier to use than the procedures currently available. Under such a mechanism, users could opt out of behavioral advertising more easily rather than having to make choices on website-by-website basis." But he acknowledged, with some disappointment, that the FTC is limited in the extent to which it can exercise oversight authority over the online advertising industry. Staff behavioral advertising report recommended: 1. Transparency and consumer control 2.Reasonable security/limited data retention 3. Affirmative opt-in for material changes to privacy promises, and 4. Affirmative opt-in for “sensitive data” (medial, children, etc.)
  2. The Electronic Communications Privacy Act limits the disclosure of certain online communications, but the privacy protections may not apply to data collected from website visitors via cookies and other similar methods. See In re DoubleClick, Inc. Privacy Litigation, 154 F. Supp.2d 497 (S.D.N.Y. 2001).
  3. FTC rulemaking grant in financial reform bill stripped at advertisers’ insistenceCDD:Recent developments in online profiling and behavioral targeting—including the instantaneous sale and trading of individual users, which increasingly involve the compilation and use of greater amounts of personal data—have all contributed to what is now standard practice online. A vast ecosystem of online advertising and data auctions and exchanges, demand-and supply‐side platforms, and the increasing use of third‐party data providers that bring offline information to Internet profiling andtargeting, operates without the awareness or consent of users.In 2009-10 three states -- Connecticut, Massachusetts and New York -- introduced bills to regulate behavioral ads, none of which passed.
  4. http://ec.europa.eu/justice_home/fsj/privacy/news/docs/pr_26_06_10_en.pdf
  5. http://www.duanemorris.com/alerts/uk_focuses_efforts_online_advertising_3689.html