Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.

Slides:



Advertisements
Similar presentations
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Advertisements

TechFire Conference Cloud Made Simple - Dispelling the Hype. Brian Larkin Operations Director Digital Planet Brian Larkin Operations Director Digital Planet.
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Privacy and Security Implications of Cloud Computing 17 November IGF Laurent Bernat - OECD.
Topics Problem Statement Define the problem Significance in context of the course Key Concepts Cloud Computing Spatial Cloud Computing Major Contributions.
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Cloud Basics.  Define what the Cloud is  Describe the essential characteristics are of the Cloud  Describe the service models of the Cloud  Describe.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud Computing Risk Assessments Donald Gallien March 31, 2011.
Keeping on top of the Cloud - Compliance from a Regulator’s Perspective Henry Chang, IT Advisor Office of the Privacy Commissioner for Personal Data, Hong.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Discussion on LI for Mobile Clouds
Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008.
The Sixth Annual African Consumer Protection Dialogue Conference
R ISK M ANAGEMENT AND C LOUD S ECURITY Rodney A. Walsh, CGEIT, CRISC//Director of IT Risk Services Paco Diaz//Senior Consultant II CACUBO Central Association.
Effectively and Securely Using the Cloud Computing Paradigm.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
© Hogan & Hartson LLP. All rights reserved. Affiliate Marketing: How To Ensure Your Third Parties Are Meeting Privacy Obligations Mary Ellen Callahan,
Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
1 SAFE HARBOR FRAMEWORK Barbara S. Wellbery Morrison & Foerster LLP 2000 Pennsylvania Avenue Washington, DC /
Computer Science and Engineering 1 Cloud ComputingSecurity.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Oregon Consumer Identity Theft Protection Act Communications Forum Theresa Masse, Chief Information Security Officer Department of Administrative Services.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
The Internet of Things and Consumer Protection
PaaSport Introduction on Cloud Computing PaaSport training material.
New A.M. Best Cyber Questionnaire
1 PARCC Data Privacy & Security Policy December 2013.
1 © 2014 IBM Corporation For IBM Internal Use OnlyIBM Proprietary 1. Cloud Introduction and Overview Experienced Bluemix BootCamp.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Innovative Partnership Solution-Driven Commitment Agile Value Sustainable.
Cybersecurity Presentation Insert Name CSIA 412. Agenda 0 Purpose of Legislation 0 Influence of Legislation 0 Legislation vs. Other Regulatory Demands.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
Welcome To We have registered over 5,000 domain names and host over 1,500 cloud servers for individuals and organizations, Our fast and reliable.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Advanced cloud infrastructures and services SAULIUS ŽIŪKAS.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
Cloud Computing: Legislative and Regulatory Frameworks Presentation to AREGNET Ria M. Thomas 29 April 2014 Occid-OrientStrategies.
The National Institute of Standards and Technology (NIST) define Cloud Computing as “a model for enabling convenient, on-demand network access to a shared.
An Information Security Management System
Cloud Computing Kelley Raines.
Consumer Privacy An Introduction
Service Oriented Architecture for Cloud Based Travel Reservation Software as a Service Comp 684 – Rayna Burgess.
CACUBO Risk Management and Cloud Security
Introduction to Cloud Computing
Cloud Computing: Concepts
Computer Science and Engineering
Presentation transcript:

Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009

FTC Overview  Broad consumer protection mandate Section 5 of the FTC Act prohibits “unfair or deceptive acts or practices in or affecting commerce” Jurisdiction over a wide variety of entities (excluding banks, common carriers, and non-profits)  Privacy and data security a major consumer protection priority

FTC Overview  Multi-pronged approach for protecting consumers: Law enforcement Outreach to consumers and businesses Policy initiatives, including working with industry to establish meaningful self-regulatory standards

FTC Enforcement  Standard is reasonableness  Process-oriented approach that emphasizes identifying and mitigating risks  There is no one size fits all solution – take into account the size and complexity of the business operations and the sensitivity of the information at stake

Outsourcing  Businesses subject to U.S. laws that outsource personal information retain responsibility for ensuring that there are reasonable procedures in place to safeguard that information. This responsibility is the same whether the service provider is located within the U.S. or offshore.

Self-regulation  Recent examples: Online behavioral advertising principles Self-regulatory initiative in APEC region to establish a framework for ensuring accountability for cross- border data transfers

Case study: Cloud Computing NIST definition: “a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

Case study: Cloud Computing  Consumer uses of cloud computing: , social networking, online gaming, shopping  Growing enterprise use of cloud computing: Software as a service, platform as a service, infrastructure as a service Private clouds, public clouds, hybrid clouds, community clouds

Case study: Cloud Computing  Legal issues: Compliance with various data security laws (GLB, HIPAA, state breach notification laws) Due diligence and oversight of service providers Contractual issues over data, security issues

FTC Privacy Roundtables  Series of day-long public roundtables to explore privacy challenges posed by new technologies and business practices First roundtable: December 7, 2009 Washington, D.C.  Topics to be explored include online behavioral advertising and cloud computing

For more information Katie Ratté