©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the TITLE MASTER SLIDE, delete the logo and place this logo on the slide in alignment with.

Slides:



Advertisements
Similar presentations
Trends in Number of High School Graduates: National
Advertisements

PARTISAN CONTROL AND STATE DECISIONS ABOUT OBAMACARE FULL GO STATES (n = 22) Arkansas Michigan CALIFORNIA MINNESOTA COLORADO NEVADA CONNECTICUT New Hampshire.
Hwy Ops Div1 THE GREAT KAHUNA AWARD !!! TEA 2004 CONFERENCE, MOBILE, AL OCTOBER 09-11, 2004 OFFICE OF PROGRAM ADMINISTRATION HIPA-30.
The West` Washington Idaho 1 Montana Oregon California 3 4 Nevada Utah
Becky Baumann Commercial Services Group. Contractual agreement Solid documentation Different type of obligation.
TOTAL CASES FILED IN MAINE PER 1,000 POPULATION CALENDAR YEARS FILINGS PER 1,000 POPULATION This chart shows bankruptcy filings relative to.
Prevalence of Self-Reported Obesity Among U.S. Adults, by Race/Ethnicity and State, Definitions  Obesity: Body Mass Index (BMI) of 30 or higher.
VIDEO AND AUDIO SURVEILLANCE LAWS
Medicaid and Non Title IV-E Making Medicaid Happen: Providing Title XIX to Non Title IV-E Populations Sharon McCartney, JD AAICAMA, APHSA.
BINARY CODING. Alabama Arizona California Connecticut Florida Hawaii Illinois Iowa Kentucky Maine Massachusetts Minnesota Missouri 0 Nebraska New Hampshire.
U.S. Civil War Map On a current map of the U.S. identify and label the Union States, the Confederate States, and U.S. territories. Create a map key and.
Hwy Ops Div1 THE GREAT KAHUNA AWARD !!! TEA 2003 CONFERENCE, BURLINGTON, VT SEPTEMBER 3-5, 2003 OFFICE OF PROGRAM ADMINISTRATION HIPA-30.
This chart compares the percentage of cases filed in Maine under chapter 13 with the national average between 1999 and As a percent of total filings,
Fasten your seatbelts we’re off on a cross country road trip!
Map Review. California Kentucky Alabama.
Judicial Circuits. If You Live In This State This Is Your Judicial Circuit Alabama11th Circuit Alaska 9th Circuit Arkansas 8th Circuit Arizona 9th Circuit.
1. AFL-CIO What percentage of the funds received by Alabama K-12 public schools in school year was provided by the state of Alabama? a)44% b)53%
The United States.
It’s been 18 years… 1996 Purchasing Power compared to cents to the dollar. What $1.00 could buy in 1996 now costs $1.48.
Directions: Label Texas, Arkansas, Louisiana, Mississippi, Tennessee, Alabama, Georgia, Florida, South Carolina, North Carolina, Virginia--- then color.
 As a group, we thought it be interesting to see how many of our peers drop out of school.  Since in the United States education is so important, we.
Warm Up Complete the Coordinate Practice #10. Content Objective: – Compare the physical and political regions. Language Objectives: – SWBAT define region.
CHAPTER 7 FILINGS IN MAINE CALENDAR YEARS 1999 – 2009 CALENDAR YEAR CHAPTER 7 FILINGS This chart shows total case filings in Maine for calendar years 1999.
Study Cards The East (12) Study Cards The East (12) New Hampshire New York Massachusetts Delaware Connecticut New Jersey Rhode Island Rhode Island Maryland.
Hawaii Alaska (not to scale) Alaska GeoCurrents Customizable Base Map text.
US MAP TEST Practice
Compliance Challenges for organizations contracting with the Federal Government Robert Klotz, VP of Technology at Akibia.
Education Level. STD RATE Teen Pregnancy Rates Pre-teen Pregnancy Rate.
1 of (F)DEC2015 IMCOM integrates and delivers base support to enable readiness for a self-reliant and globally-responsive All Volunteer Army WE.
After reading this chapter, you will be able to:  Find U.S. Supreme Court cases  Find other federal court decisions  Locate state court opinions  Know.
TOTAL CASE FILINGS - MAINE CALENDAR YEARS 1999 – 2009 CALENDAR YEAR Total Filings This chart shows total case filings in Maine for calendar years 1999.
The United States is a system that can be broken into 5 major parts or regions.
Michelle E. Wade, MS, M.Ed., NCC, LCPC Ethics Specialist, American Counseling Association.
Can you locate all 50 states? Grade 4 Mrs. Kuntz.
USA ILLUSTRATIONS – US CHARACTER Go ahead and replace it with your own text. This is an example text. Go ahead and replace it with your own text Go ahead.
1st Hour2nd Hour3rd Hour Day #1 Day #2 Day #3 Day #4 Day #5 Day #2 Day #3 Day #4 Day #5.
NEADA Winter Meeting February 28, 2017.
2012 IFTA / IRP MANAGERS’AND LAW ENFORCEMENT WORKSHOP
The United States Song Wee Sing America.
Visa Bankruptcy Education Services
Expanded State Agency Use of NMLS
The United States.
Physicians per 1,000 Persons
Visa Bankruptcy Education Services
USAGE OF THE – GHz BAND IN THE USA
Visa Bankruptcy Education Services Bankruptcy Statistics May 19, 2016.
Content Objective: Language Objectives:
Name the State Flags Your group are to identify which state the flag belongs to and sign correctly to earn a point.
GLD Org Chart February 2008.
Membership Update July 13, 2016.
2008 presidential election
State Adoption of Uniform State Test
The States How many states are in the United States?
State Adoption of NMLS ESB
Supplementary Data Tables, Trends in Overall Health Care Market
AIDS Education & Training Center Program Regional Centers
REAL ID Briefing for NEBTA
Table 2.3: Beds per 1,000 Persons by State, 2013 and 2014
Regions of the United States
DO NOW: TAKE OUT ANY FORMS OR PAPERS YOU NEED TO TURN IN
Regions of the United States
Supplementary Data Tables, Utilization and Volume
Presidential Electoral College Map
ACI – 17th National Forum on Prepaid Card Compliance
2008 presidential election
WASHINGTON MAINE MONTANA VERMONT NORTH DAKOTA MINNESOTA MICHIGAN
Expanded State Agency Use of NMLS
CBD Topical Sales Restrictions by State (as of May 23, 2019)
AIDS Education & Training Center Program Regional Centers
USAGE OF THE 4.4 – 4.99 GHz BAND IN THE USA
Presentation transcript:

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the TITLE MASTER SLIDE, delete the logo and place this logo on the slide in alignment with 3D icon blocks. Understanding Privacy and Security Litigation Michael P. McCloskey Andrew B. Serwin Partner, Securities Litigation Partner, IP Litigation 402 West Broadway 402 West Broadway Suite 2100Suite 2100 San Diego, CA Telephone: Telephone:

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Privacy General Principles: –Notice –Choice –Onward Transfer –Access –Security –Data Integrity –Enforcement

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Privacy Ultimately Four Issues: –What information do you collect –What do you do with the information –When can’t you disclose it –When must you disclose it

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Federal Privacy Statutes Children’s Online Privacy Protection Act (COPPA); Gramm-Leach-Bliley (financial); Electronic Communications Privacy Act; Health Insurance Portability and Accountability Act (medical); and Others (FCRA, FACTA) Right to Financial Privacy Act

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. COPPA (15 U.S.C. § 6501, et seq. 16 C.F.R. § 312 et seq.) Restricts the collection of information from children 12 and under by “operators” of: –commercial websites that are directed to children 12 and under that collect personal information from children; –general websites that knowingly collect personal information from children 12 and under; and –general websites that have a separate children’s area and that collect personal information from children 12 and under. Does not apply to ISPs in most circumstances

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. COPPA FTC is very active with COPPA issues –Time out cookies –“Bounce” issues –From v. about –Age Field The FTC just renewed the COPPA rules

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Electronic Communications Privacy Act (18 U.S.C. § 2510 et seq.) There are two portions of the ECPA –The Wiretap Act; and –The Stored Communications Act This is a temporal distinction

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Electronic Communications Privacy Act (18 U.S.C. § 2510 et seq.) Wiretap Act and Councilman. –Prohibits “interception” of “electronic communications”. "electronic communication" "any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronic or photooptical system that affects interstate or foreign commerce," –Does not include electronic storage as does the definition of “wire communications” or the storage definition of the Stored Communications Act.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Electronic Communications Privacy Act (18 U.S.C. § 2510 et seq.) Applies mostly for businesses in the employee context. Two potential exceptions: –protect the provider, another provider, or a user, from fraudulent, unlawful or abusive use of such service; or –a person employed or authorized, or whose facilities are used, to forward such communication to its destination

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. State Employee Monitoring Laws Connecticut –Requires notice and posting of notice of the employer’s monitoring policies Delaware –Requires that notice be given every day to the employee Certain exceptions apply for investigations Civil penalties are available Fischer v. Mt. Olive Lutheran Church

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Federal Disclosure Statutes Communications Assistance for Law Enforcement; and The Patriot Act The DMCA

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. The FTC and Privacy FTC has an announced privacy agenda –Stepping up enforcement of Spam laws –Increasing assistance to victims of identity theft –Enforcing company’s privacy promises is also a focal point of the FTC’s agenda –Enforcing federal laws Additional guidance is available via consent orders posted on the FTC website

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. The FTC and Privacy Tower Records –Claimed to have reasonable security in shopping cart area –Had a security issue that permitted customer information to be revealed CartManager International –Third Party provider misrepresented BJ’s Electronics –Inadequate data security on wireless networks with credit card information

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. The FTC and Privacy Sunbelt Lending Services –Violation of the Safeguard Rule, including for the failure to assess risks and implement safeguards to control these risks, train and oversee employees, and monitor the network for vulnerabilities DSW ChoicePoint CardSystems, Inc –Inadequate data security was an unfair practice

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Pretexting Covered by GLB. Also prohibited under a number of state and federal laws.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. What is Pretexting? Obtaining certain forms of information under false pretenses. It can be improper depending upon the type of data, the type of person seeking it, and the purpose of the request.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Situations where pretexting has been used to obtain information –Disability claims (malingering) –Collection cases/background checks –Investigative/celebrity reporting –“Non-compete” investigations –To find witnesses, research alibis –Finance/accounting fraud allegations –Investigating falsification of records –Misappropriation of trade secrets –Misuse/theft of corporate assets –Derivative claims –Competitive intelligence –Litigation related investigations –To detect ongoing violations of law

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Why would anyone pretext? –Difficult to discover information by other means –Subpoena/discovery power is unavailable –Legitimate information brokers have “dried up” –Information obtained by pretext is widely available on the internet as “research” for a fee –Disgruntled employees with access can be bribed –Information brokers contend method is not illegal, or an “investigative” or “prosecutorial” exception –Anonymity of source may lend false sense of legitimacy –Avoids having to close investigations for lack of proof –Deception gives criminals edge –Lack of enforcement

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Risks of Improper Pretexting Criminal, civil penalties, including aiding and abetting –Hewlett Packard case Potential violations of attorney code of professional responsibility – potential disciplinary consequences –False statement of material fact or law to third person –Conduct involving dishonesty, fraud, deceit or misrepresentation –Failure to supervise –Counseling client to commit a crime or fraud –Misleading unrepresented persons –“Reflects adversely” on lawyer’s “fitness to practice” Civil liability for investigator’s tortious conduct Suppression of evidence, other sanctions Adverse publicity

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Pretexting and Investigations The type of information sought can effect your ability to get it. Where the information is coming from matters as well.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. The Law of Pretexting GLB Wire fraud The Federal Trade Commission Act/Telecommunications Act of 1996 The Computer Fraud and Abuse Act State identity theft laws State restrictions on phone records Common law fraud

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Pretexting and State Law Many companies are subject to many states’ jurisdiction and consideration of state law is important. By seeking information from providers in many cases the information sought may be subject to state protection It is not always clear what law applies to your investigation.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. California Law California –Recently adopted SB 202. –It applies to telephone records. –Need fraudulent intent for obtaining records.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Most States Have Identity Theft Laws Alaska Arizona Arkansas California Connecticut Delaware Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana Maine Maryland Massachusetts Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Rhode Island South Carolina South Dakota Tennessee Texas Utah Vermont Virginia Washington Washington D.C. West Virginia Wisconsin Wyoming

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. State Public Utility Restrictions on Telephone Records California Public Utilities Code Section California Code of Civil Procedure Section

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. What You Can Do to Prevent Problems and Run a Proper Investigation. Find out what state and federal laws are applicable to your company/industry. Check out your investigators. Consider whether it is better to run investigations internally or externally. Consider whether you really need the information you are seeking. Consider including policies regarding information gathering in litigation or pre-litigation matters. Consider inserting contractual language in investigator’s agreements.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. What You Can Do to Prevent Problems and Run a Proper Investigation. Restrict the gathering of certain types of information under false pretenses. Limit the scope of your investigation to the purpose of the investigation. Make sure you have a monitoring policy in place. Consider whether you have authority to gather information from an employees’ computer or network.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. International Issues SOX –Whistleblower issues and foreign data protection regimes Employee issues

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. California’s Online Privacy Protection Act (Cal. Bus. & Prof. Code § 22579) Applies if “personal information” is collected through the website A website must then: –Have a privacy policy that discloses the type of information collected; –Describes the process, if any, for consumers to change their information; –Describe the process for consumers to receive notice of material changes to the policy; and –Identify its effective date Format requirements

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Notice of Security Breach Laws (Cal. Civ. Code § ) Triggered if there is a breach of a data security; and A consumer’s personal information is implicated Applies even if there is simply a reasonable belief that there was an acquisition of data Law enforcement concerns Direct notice typically required, though substitute notice is permitted in certain instances

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Notice of Security Breach Laws Issues to watch out for –What good is encryption? –Electronic v. non-electronic North Carolina’s law applies to non-electronic –Is there a general duty? –Who else must notice be given to? –What form of notice? –Is notice required if there is no likelihood of identity theft?

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Notice of Security Breach Issues 33 other states (and the OCC) have enacted laws or rules –Including: Arkansas; Connecticut; Delaware; Florida; Georgia; Illinois; Indiana; Louisiana; Maine; Minnesota; Montana; Nevada; New Jersey; New York; North Carolina; North Dakota; Rhode Island; Tennessee; Texas and Washington Ohio Attorney General action

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Restrictions Upon the Collection of SSNs (Cal. Civ Code § ) Companies cannot: –Post or publicly display SSNs; –Print SSNs on identification cards; –Require people to transmit SSNs over the internet unless it is encrypted or the connection is secure; –Use a SSN as a login unless a password is also required; or –Print it on materials unless legally required

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Social Security Number Laws Alabama Arizona Arkansas California Colorado Connecticut Delaware Florida Illinois Indiana Louisiana Maryland Michigan Minnesota Missouri Nevada New Jersey New Mexico North Carolina Oklahoma Oregon Rhode Island South Dakota Tennessee Texas Utah Vermont Virginia Washington Wisconsin

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. California’s Data Security Law (AB 1950 Cal. Civ Code § ) Broad law that applies across the board, even to non-electronic data The law is triggered if a business owns unencrypted personal data regarding a California resident Businesses and third-parties who receive data must have “reasonable” security measures and procedures Sliding scale

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. California’s Data Destruction Law Consumer records must be destroyed if they contain personal information, when the records are no longer needed This obligation applies whether the record is in electronic form, or not Destruction is accomplished through: –shredding; –erasing, or –otherwise modifying the personal information in those records to make it unreadable or undecipherable through any means

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Data Security/Destruction Laws SOX FACT Act Arkansas California Colorado Indiana Minnesota Montana Nevada New Jersey New York North Carolina Rhode Island Tennessee Texas Utah Vermont Washington

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Spyware and Phishing 12 states have enacted laws (mostly this year) on spyware or phishing. What is spyware? –“software that gathers information about a computer’s use and transmits that information to someone else, appropriates the computer’s resources, or alters the functions of existing applications on the computer, all without the computer user’s knowledge or consent.” FTC v. Seismic Entertainment Productions, Inc., 2004 WL

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Spyware and Phishing Spyware and the DMCA Recent issues

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Spyware, Phishing and Pharming What is the importance of these issues to companies? –Implicates advertising. –Effects software update features. –Customer losses. –Business losses and network costs. –IP infringement.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Restrictions on Spyware What triggers a spyware law? –Effecting a computer you do not own. –Engaging in some form of deceptive conduct.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Restrictions on Spyware What are examples of deceptive or improper acts. –Gathering certain forms of personally identifiable information. –Changing a homepage setting. –Changing computer settings. –Blocking the installation of software. –Causing the installation of software. –Changing other Internet settings. –Assuming control of a computer. –Setting cookies?

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Civil Actions for Spyware In many cases civil actions (apart from statutory violations) face legal hurdles. Kerrins v. Intermix –Disgorgement of profits not permitted as a remedy. –Included California’s Little FTC Act, B&P Section

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Civil Actions for Spyware Restrictions on enforcement. –Some states limit the categories of people that can bring an enforcement action. Directly effected consumer. ISPs. The state. Trademark owner.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Phishing and Pharming Phishing is the use of or other means to imitate a legitimate company or business in order to obtain passwords or other sensitive information in order to commit theft or fraud. Pharming is the use of an improper website in order to obtain information improperly.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Potential Enforcement for Phishing and Pharming. CFAA. Wire fraud. FTC Act. State FTC Acts. State phishing and identity theft laws. IP lawsuits.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Privacy Litigation Airlines cases. –Dyer v. Northwest Airlines Corporation, et al., 334 F.Supp.2d 1196 (D.N.D. 2004); –In re American Airlines Privacy Litigation, 3:04-MD D (N.D.Tex. 2005). Laptop case. –Guin v. Brazos Higher Educ. Service Corp., Inc., 2006 WL (D.Minn. 2006). No standing/no damages. –Bell v. Acxiom, 2006 WL (E.D.Ark. 2006).

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Privacy Takeaways Assess what information is being collected Think through the types of data you are collecting Determine what laws apply to your company based upon the information it collects, where it does business and the identity of its customers

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Privacy Takeaways Make sure that employees understand that they do not have an expectation of privacy in their use of your and electronic systems. Consider what security systems you have in place and what securities measures you are requiring third parties to have. Consider restrictions upon the use of removable media. Make sure your privacy policy makes the necessary disclosures.

©2006 Foley & Lardner LLP WHEN PRINTING IN BLACK & WHITE: Go to the MASTER SLIDE, delete the logo and place this logo on the slide. Privacy Takeaways Reserve the right to modify your privacy policy Ensure that employees are aware of your policies Assess whether you have a responsibility to report a data security incident Consider what security systems you have in place and what securities measures you are requiring third parties to have Determine if you are sending or receiving data to countries that have higher privacy and security standards