Self-Regulatory Approaches to Cross-Border Transfers of Personal Data: The APEC Experience The Privacy Symposium August 2007 Fran Maier Executive Director,

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

Yukiko Ko Binding Corporate Rules – Global Implications Conference on Cross Border Data Flows and Privacy October 16, 2007.
TRUSTes EU Safe Harbor Seal Program Compliance and Enforcement Update Conference on Cross-Border Data Flows & Privacy October 15-16, 2007 Martha K. Landesberg.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
BIE SPECIAL EDUCATION ACADEMY PRESENTERS: JUDY WILEY AND NARCY KAWON I ntroduction to Procedural Safeguards Bureau of Indian Education.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Page 1 AT&T Billing Solutions Anti-Cramming Policy Overview May 11, 2011.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Module 7 Slide 1 NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 7 Enforcement.
The Internet industry’s privacy seal program Silicon Valley Web Guild.
CONFIDENTIAL1 TRUSTe Certification & APEC FTC Workshop on Enforceable Codes of Conduct Panel on APEC’s CBPR System November 29, 2012.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
September 5, 2013 Southern Region Break-Out NAAA Annual Convention.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
SEMINAR NAIC/ASSAL/SVS REGULATION & SUPERVISION OF MARKET CONDUCT © 2014 National Association of Insurance Commissioners Complaint Handling.
Consumer Law: Protection and Compliance UCC 11 December 2014 Consumer Law: the European Agenda.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Per Anders Eriksson
Minnesota Law and Health Information Exchange Oversight Activities James I. Golden, PhD State Government Health IT Coordinator Director, Health Policy.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Introduction to the West Virginia Executive Branch Privacy Policies Executive Branch Privacy Program Education & the Arts Presented by Heather Butler,
Compliance with the WTO Technical Barriers to Trade Agreement and Steps Toward Developing Good Regulatory Practices Bryan O’Byrne Trade Compliance Center.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
1 Click to Check Public FTAA.ecom/inf/122 February 13, 2002 Original: English.
1 DOE IMPLEMENTATION WORKSHOP ASSESSING MY EMS Steven R. Woodbury
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Asian Personal Data Privacy.
A Perspective: Data Flow Governance in Asia Pacific & APEC Framework Martin Abrams October 21, 2008.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Electronic Signatures in the SFA Loan Programs Electronic P-Notes Presented by Jeff Baker & Kay Jacks.
Avoid Disputes, Not Complaints Presented by: Stuart Ayres and Derek Pullen Stuart Ayres, Scheme Manager Derek Pullen, Scheme Adjudicator.
July 2013 What you need to know about procuring suppliers Deborah Ramshaw and Lois Shield.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
North Carolina Health Information Exchange Governance Workgroup Date: May 12, 2011 Time: 9:00 am – 11:00 am Location: NC Institute of Medicine 630 Davis.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
May l Washington, DC l Omni Shoreham Web Hosting Potentials and Pitfalls David Snead Attorney W. David Snead, P.C.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
The Privacy Symposium August 22, 2007 ©2007. Goodwin Procter LLP The Ethics and Responsibilities of a Privacy Professional.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Enforcement Overview Melissa Cordell, P.G. Enforcement Division Office of Compliance and Enforcement Texas Commission on Environmental Quality Environmental.
Nassau Association of School Technologists
Presented by: David Reid, DBA International
Transparency and Coordination in Rulemaking
Update from the Faster Payments Task Force
APP entities (organisations)
Employee Privacy and Privacy of Employee Information
activistpost Being connected to the largest information.
Enforcement and Policy Challenges in Health Information Privacy
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Principle #1 – Appropriate Product Design and Delivery This presentation is made possible by the Smart Campaign   [Introductions of facilitator(s)
Transparency and Coordination in Rulemaking
Presentation transcript:

Self-Regulatory Approaches to Cross-Border Transfers of Personal Data: The APEC Experience The Privacy Symposium August 2007 Fran Maier Executive Director, TRUSTe

Self-Regulatory Approaches to Cross-Border Transfers of Personal Data: The APEC Experience The Privacy Symposium August 2007 Fran Maier Executive Director, TRUSTe

CONFIDENTIAL DRAFT4 About TRUSTe Independent, non-profit headquartered in San Francisco –Washington, DC gov’t affairs office Web Privacy Seal Program –Anti-spam and standards –Trusted Download Program for legitimate (spyware-free) downloads Celebrating 10 Year Anniversary

CONFIDENTIAL DRAFT5 Mission Advancing Privacy and Trust for the Networked World Widely accepted privacy best practices Elevate responsible players Help consumers identify who they can trust Supplement legislation and regulation Address emerging privacy vulnerabilities and threats

CONFIDENTIAL DRAFT6 TRUSTe: 10 Years of Impact Web Privacy Seal –2,400 Websites –1,500 companies –22 of Top 50 most visited websites –1 Million “click-to-verify” pageviews monthly –Thousands of consumer complaints resolved annually EU Safe Harbor Seal by authority of the US Department of Commerce Children’s Online Privacy Protection Act Safe Harbor by authority of the US Federal Trade Association Privacy Seal beyond legal requirements for legitimate mail Trusted Download Program (beta) –Certifying consumer downloadable software (not Spyware)

CONFIDENTIAL DRAFT7 Our Sealholders

CONFIDENTIAL DRAFT8 Today Certification Process –Complete, Rigorous, Beyond simple Self-Assessment Compliance and Enforcement Toolbox –Aimed at improvement –Thorough, Regular, and Action-Oriented –Dispute Resolution, Monitoring, and Enforcement Building toward Common Criteria

CONFIDENTIAL DRAFT9 Today’s Agenda Part One: APEC Cross-Border Privacy Rules and Trustmarks Part Two: Model Trustmark Elements: the TRUSTe Experience

CONFIDENTIAL DRAFT10 Part One APEC: Cross-Border Privacy Rules

CONFIDENTIAL DRAFT11 APEC: Cross-Border Privacy Rules 1999: Electronic Commerce Steering Group (ECSG) established –Purpose: coordinate e-commerce activities in APEC –Structure: works through subgroups : ECSG surveys of APEC economies –approaches to consumer protection –legal recognition of electronic documents and signatures 2002: Data Privacy Subgroup established –Purpose: develop APEC-wide privacy framework 2004: APEC Member Economies endorse Privacy Framework –9 Guiding Principles –Goal: maximize privacy protection and continuity of cross-border data flows

CONFIDENTIAL DRAFT12 APEC: Cross-Border Privacy Rules Privacy Framework Principles –Preventing Harm –Notice –Collection Limitations –Uses of Personal Information –Choice –Integrity of Personal Information –Security Safeguards –Access and Correction –Accountability

CONFIDENTIAL DRAFT13 APEC: Cross-Border Privacy Rules Privacy Framework Implementation Guidance –Support development and recognition of organizations’ cross- border privacy rules that adhere to APEC Privacy Principles –Work with stakeholders to develop mechanisms for the mutual recognition or acceptance of cross-border privacy rules between and among economies –Ensure that rules and recognition mechanisms facilitate accountable cross-border data transfers and privacy protections, without unnecessary burdens on data flows, businesses, or consumers

CONFIDENTIAL DRAFT14 APEC: Cross-Border Privacy Rules 2005: Cross-Border Privacy Rules Study Group established –Purpose: examine implementation options –Activities: Technical Assistance Seminars on International and Domestic Implementation of Privacy Framework held in Korea and China, respectively 2006-Present –“Four Step Approach to Cross Border Privacy Rules” questionnaire distributed to economies Asks how each economy would implement Privacy Framework for cross-border context, including recognition of Trustmark organizations –Second Technical Assistance Seminar on International Implementation held in Australia, June 2007 showcases the role of Trustmarks as “accountability agents” –12 economies agree to participate in ‘Data Privacy Pathfinder’ pilot project in 2008, to implement voluntary cross-border privacy rules system within APEC

CONFIDENTIAL DRAFT15 TRUSTe Collaboration with Trustmarks in APEC Member of Asia Trustmark Alliance (ATA) Task Force Project: Common Criteria for Cross-Recognition of Trustmarks under APEC Privacy Framework –Standards for Comparing Trustmarks –Standards for Certification of Merchants by Trustmarks –Essential for implementation of cross-border privacy rules First draft presented at May 2007 Trustmark Conference, Mexico City Now under consideration by ATA membership Paradigm for accountability agent structure in APEC

CONFIDENTIAL DRAFT16 Example Principle and Criteria 4Privacy 4.9. Accountability A personal information controller should be accountable for complying with measures that give effect to the Principles stated above. When personal information is to be transferred to another person or organization, whether domestically or internationally, the personal information controller should obtain the consent of the individual or exercise due diligence and take reasonable steps to ensure that the recipient person or organization will protect the information consistently with these Principles Accountability of merchant: How does certifier require that merchant be accountable for complying with these measures? ___Certifier requires that merchant establish and maintain a system to implement the provisions of its website privacy statement and practices. ___Certifier requires that merchant assign individual(s) to be responsible for the accuracy of website privacy statement and for receiving and processing user questions or complaints. ___Certifier requires that merchant periodically or regularly undertake an audit of its privacy policy compliance, either through self-assessment or by a third party. ___Other (please specify): ____________________________________________

CONFIDENTIAL DRAFT17 Part Two Model Trustmark Elements: The TRUSTe Experience

CONFIDENTIAL DRAFT18 TRUSTe Certification Process 1.Web Site Privacy Assessment –Application/Contract –Self-Assessment 2.Web Site Audit –TRUSTe expert –Access Reputation and other Data –Revision of policy and practice 3.Seals Awarded and Displayed 4.Ongoing Monitoring & Dispute Resolution –Watchdog Dispute Resolution –Scanning/Seeding

CONFIDENTIAL DRAFT19 TRUSTe Certification Process: Improve Licensee Practices 1.Online Application 2.Enforceable Contract 3.Payment 4.Strong Commitment Over 90% required to make changes to business practices –Notice at Point of Collection –Privacy Policy disclosures esp. cookies and third-party sharing –HTTPS for sensitive data (e.g. credit card)

CONFIDENTIAL DRAFT20 TRUSTe Privacy Seal Certification Prospective sealholder submits completed 67-question privacy self-assessment and application to TRUSTe TRUSTe reviews the prospective member's website, privacy practices and privacy statement against our program requirements TRUSTe team delivers a Site Findings Report (SFR) to the prospective member with required changes for improvement and compliance with program requirements Prospective member makes necessary corrections to comply with TRUSTe program requirements TRUSTe Compliance team does quality check of prospective members Web site and practices against TRUSTe program requirements TRUSTe issues certificate and license to display the seal to new member New member implements TRUSTe seals per TRUSTe seal implemenation requirements TRUSTe monitors member website for proper implementation through the year TRUSTe checks compliance with new requirements and regulations during renewal

CONFIDENTIAL DRAFT21 Compliance and Enforcement Toolbox Certification: –90% improve practices Watchdog Dispute Resolution –100% resolution –Small # of terminations Proactively monitor –Scanning: 50% fail and then fix – Seeding Enforcement Options –Non Renew –Suspend –Terminate

CONFIDENTIAL DRAFT22 Online independent recourse mechanism for consumers to report Goal is to augment Sealholder’s privacy program, escalate and resolve complaints quickly 86% would recommend using Watchdog to a friend “ I loved Adobe beforehand and I love it now. TRUSTe facilitated getting me to the right person to talk to.” Watchdog Online Dispute Resolution

CONFIDENTIAL DRAFT23 TRUSTe Watchdog Complaints Resolve per year directly –Also offer “self help” through web site TRUSTe works with consumer and the sealholder to resolve issues Critical input to monitoring process Goal: Improve Consumer Note: for all TRUSTe Watchdog Complaints

CONFIDENTIAL DRAFT24 Types of Investigations: Primarily Customer Care Process (65%): –Unsubscribe me –Close account –Can’t reach licensee Technical (20%): –Interface disclosures –TRUSTe seeding of client lists to check unsub link, unauthorized third-party mail Privacy Statement Analysis (14%): –Notice about data sharing, cookies etc. Legal/Policy Analysis: –Legal status of unusual business models or practices –Potentially deceptive notice

CONFIDENTIAL DRAFT25 Severity Scorecard: Early Warning System Used to analyze Watchdog complaints by company and provide early warning Weighting helps assess: –severity of complaint(s) –trends in complaint type –Trends in complaint volume Color/letter process map reflect: type of follow-up and sealholder changes required: –type of investigation –privacy policy change –notice at opt-in –type of information collected –data spill assistance to Licensee –level of escalation within TRUSTe TRUSTe Watchdog Diagnosis (Complaints per Month) Increasing Offenses weight ed score 123+ Unable to unsubscribeDEG Unauthorized profile with my information DEG Unwanted DEG Excessive DEG sent without permissionDEG Unable to close accountDEG Unable to change/delete personal information DEG Shared personal informationABC Violated privacy policyABC Unable to contact licenseeABC Children's information (under 13)ABC Inconsistent Unsubscribe Instructions ABC Inaccurate Disclosure: POCABC Inaccurate Disclosure: PSABC

CONFIDENTIAL DRAFT26 Consumer files complaint with the TRUSTe Watchdog Dispute Resolution Program watchdog_complaint.php TRUSTe reviews all complaints for jurisdiction and responds to consumer within five (5) business days TRUSTe forwards complaint to TRUSTe licensee who is required to respond within five (5) business days Licensee provides restitution to consumer directly or via TRUSTe at consumer request Consumer is given 10 business days to accept or reject proposed restitution When consumer responds, TRUSTe mediates resolution satisfying both consumer and licensee and then TRUSTe closes the complaint record When consumer does not respond, TRUSTe considers the resolution accepted and closes the complaint record Steps to Resolve a Watchdog Complaint Working with Consumer and Sealholder to reach satisfactory resolution

CONFIDENTIAL DRAFT27 Evaluate websites from many angles: proactive and reactive approach Ongoing Monitoring Technological scans “seeding” Reputation monitoring Ongoing reviews Watchdog monitoring Other reviews of blogs, press, consumer postings Approximately 50% of scans discover problems

CONFIDENTIAL DRAFT28 Enforcement Options Suspend Certification –Notified on Verification Page –Seal still on Website –Timeframe for Resolution Terminate –Termination for Convenience (non-public) - other issues not directly related to contract and/or reputation issues –Terminate and Rehabilitate – Batteries.com –Termination for Cause (Publish on website) – Gratis/FreeIPods.com –Terminate and refer case to law enforcement/regulators – ToySmart.com Process must be Transparent, Consistent, Fair, and Lead to Positive Consumer Outcomes –Usually result in company coming back into compliance Independent Non-Profit Status Important

CONFIDENTIAL DRAFT29 Termination Case Study Gratis Internet Gratis Internet violated its stated policy to not sell or rent personal information to third parties TRUSTe investigated Watchdog reports of sharing by seeding accounts TRUSTe required Gratis to change privacy practices Gratis complied but could not offer any remedy for consumer complaints, and refused privacy training TRUSTe publicly terminated Gratis Internet gaining the attention of the NY Attorney General Gratis was sued by the Attorney general for violating its privacy policy Timeline : Gratis Internet, freeipods.com certified by TRUSTe : TRUSTe investigates complaints about freeipods sharing addresses with 3 rd parties : TRUSTe issues (private) Notice of Termination unless Gratis remedies all violations within 20 days : Seals are deactivated and Gratis removes TRUSTe seals from Website, : TRUSTe issues (public) Notice of Termination 3/14/2006: New York Attorney General sues Gratis for breach of privacy policy after lengthy investigation

CONFIDENTIAL DRAFT30 Enforcement Action Case Study: Batteries.com Batteries.com violated privacy policy when it changed it shared PII with a 3rd Party without gaining prior consent TRUSTe responded immediately and took swift corrective/enforcement action including notice of termination Fortunately Batteries.com agreed to the remedial steps –Apology sent to affected customers –In-house audit of privacy practices by TRUSTe –On-site privacy training Benefit to licensee and consumer by improving privacy practices and avoiding future breaches Timeline : Batteries.com signs license agreement : Sungifts.com sends out promotion offering free subscription to Men’s Journal : CNet writer Berlind exposes breach of privacy policy in ZDNet : TRUSTe issues Notice of Termination unless Batteries.com remedies all violations.

CONFIDENTIAL DRAFT31 Building Blocks for Effective Programs 1.Strong Program/Certification Requirements 2.Thorough and impartial audit, more than self assessment 3.Accountability and Enforcement 4.Credible oversight from multiple parties 5.Evolving standards and accountability, ability to address new issues

CONFIDENTIAL DRAFT32 Mutually Reinforcing Activities

CONFIDENTIAL DRAFT33 Contact Information Fran Maier Executive Director & President TRUSTe 685 Market Street, Suite 270 San Francisco, CA