Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
As social media and mobile devices and apps (“social-mobile”) continue to proliferate in the corporate enterprise, and e-commerce firms rely evermore on these technologies to assist promotion and sales, these forms of collaboration and information-sharing are putting a new spin on compliance issues.
A tidal wave of publications and seminars has proliferated of late that address many of these issues. Topics range from preventing trade secrets from leaking on Facebook to the ethics of monitoring current and potential employees in and out of the workplace.
Garnering much less attention are the compliance and risk issues that new marketing initiatives using social-mobile can present. To minimize such issues, legal departments and other counsel on whom these businesses depend for advice must develop a working relation- ship with marketing and IT in order to fully understand how information acquired through social-mobile initiatives is being collected, stored and used by the company, and to assess the impact on the company's electronic discovery, records-retention and regulatory-compliance obligations.
In the United States, several hundred state laws govern data captured by companies, including social-mobile data. These laws include statutes regarding:
An alphabet soup of federal regulations also govern this data (e.g., HIPAA, the Health Insurance Portability and Accountability Act, http://bit.ly/16IvtE; COPPA, the Children's Online Privacy Protection Act, http://bit.ly/jYYFvT; FACTA/FCRA, the Fair and Accurate Credit Transactions Act, and the Fair Credit Reporting Act, http://bit.ly/udH44K and http://bit.ly/3Pu0Fe, respectively; ECPA, the Electronic Communications Privacy Act, http://bit.ly/GkNog; and the VPPA, the Video Privacy Protection Act, http://bit.ly/Hus9r). As emerging technologies continue to challenge societal expectations of privacy, new methods for collecting, storing, aggregating and sharing information continue to push the boundaries of our legal frameworks. As a result, we are now seeing:
These issues and events create significant risks for any company caught unprepared in the social-mobile data frenzy.
Tip of the Iceberg
As companies increase their efforts to collect, use and share social-mobile data, they should expect legal challenges to increase.
Last year, The Wall Street Journal examined 101 popular smartphone applications and found that more than half transmitted a phone's unique identifier to third parties without users' permission, and 47 sent the phone's location to third parties. Five apps went further, sending users' gender, age and other personal data to third parties. Negative publicity and several lawsuits against the companies publishing these apps have heightened awareness, but the problem hasn't abated. A recent patent application filed by Apple describes a framework for deploying and
pricing ads based on information derived from consumers' browsing and searching activities, and the contents of their media library. It also describes using the contents of friends' media libraries to better target ads, and explains how Apple could tap “known connections on one or more social networking websites” to accomplish this. Given the intent to leverage what many consider personal and private information, the company would be well advised to develop a well thought-out legal and compliance strategy regarding the collection and use of this data before deploying the technology.
If these examples seem extreme, consider that IBM recently announced a new retail technology that enables stores to offer targeted third-party products and services to consumers at checkout. The solution allows shoppers who use mobile devices to scan orders, redeem digital coupons, access loyalty points and pay for orders at self-service pay stations. The related compliance issues are significant for retail establishments large and small.
Complicating the issues is the pervasive legal ambiguity and inconsistency as to what information is protected and subject to regulation among jurisdictions. There has also been an expansion in the definition of protected private information. For example, the California Supreme Court, in Pineda v. Williams Sonoma, 51 Cal. 4th 524 (2011) (http://bit.ly/uJiNtf), recently held that customer ZIP codes are private information subject to protection under a state law governing what information can be collected as part of face-to-face credit-card transactions. Federally, Congress and the Supreme Court have shown an ever-increasing interest in defining geospatial reference data on smart phones and IP addresses as private information.
Unfortunately, most companies still view social-mobile data as marketing information, not as private, and protected, records. But along with the ability to tie this data to specific individuals comes the need to treat it as other private information is treated. This is especially true when the data is used for purposes unrelated to why it was originally collected.
Best Practices: Seven Privacy and Risk Priorities
To avoid privacy-related lawsuits targeted against the use of social-mobile data, it's vital that companies have a clear plan about:
Seven best practices for counsel to keep in mind follow.
1. Visit your own websites and social-media pages, and download and use your company's apps. Give as much attention to what is on your public website and how your company is using customer apps ' especially the app license and use agreement ' as you do to the internal policies for records management, records training and legal-holds training.
2. Pay special attention to “digital safes” and other tools that store personal and private customer information. How is this data managed and what practices, processes and controls are in place to properly manage and protect it? It is especially important to consider what is implied by your brand (are you a security company, for instance?) or explicitly found in your marketing materials.
3. Have a conversation with your CMO soon. Just as you engaged with IT a few years ago, you now need to engage the marketing department. What are its business goals? What is it doing and what is it planning for next year, especially in the area of customer engagement and social-mobile apps?
4. Revisit your privacy policy, based on what your company is actually doing. Then “operationalize” your policies: Design them for execution rather than aspiration; that is, engage with the lines of business and those in the IT organization that will be enforcing the policies.
5. Modernize your records-and-retention program. Provide meaningful, actionable guidance on what information to retain, how to retain it, how long to retain it and where to retain it. Provide procedures, not just policies, on what can and cannot be done with information during retention.
6. Understand the sources and atomic structure of today's highly complex information. Where does it originate? What form does it take? Who has access to it over its life? How is it assembled and aggregated? How is it used and reused? Is it sold, bartered or shared with third parties? How can it be dismantled for disposition?
7. Work with the Chief Information Officer to design governance and disposal into IT systems, instead of trying to apply it after the fact.
While today's privacy environment is highly complex and dynamic, a well conceived plan and thoughtful dialogue with all involved and concerned, or who could be, can help you on your journey.
As social media and mobile devices and apps (“social-mobile”) continue to proliferate in the corporate enterprise, and e-commerce firms rely evermore on these technologies to assist promotion and sales, these forms of collaboration and information-sharing are putting a new spin on compliance issues.
A tidal wave of publications and seminars has proliferated of late that address many of these issues. Topics range from preventing trade secrets from leaking on Facebook to the ethics of monitoring current and potential employees in and out of the workplace.
Garnering much less attention are the compliance and risk issues that new marketing initiatives using social-mobile can present. To minimize such issues, legal departments and other counsel on whom these businesses depend for advice must develop a working relation- ship with marketing and IT in order to fully understand how information acquired through social-mobile initiatives is being collected, stored and used by the company, and to assess the impact on the company's electronic discovery, records-retention and regulatory-compliance obligations.
In the United States, several hundred state laws govern data captured by companies, including social-mobile data. These laws include statutes regarding:
An alphabet soup of federal regulations also govern this data (e.g., HIPAA, the Health Insurance Portability and Accountability Act, http://bit.ly/16IvtE; COPPA, the Children's Online Privacy Protection Act, http://bit.ly/jYYFvT; FACTA/FCRA, the Fair and Accurate Credit Transactions Act, and the Fair Credit Reporting Act, http://bit.ly/udH44K and http://bit.ly/3Pu0Fe, respectively; ECPA, the Electronic Communications Privacy Act, http://bit.ly/GkNog; and the VPPA, the Video Privacy Protection Act, http://bit.ly/Hus9r). As emerging technologies continue to challenge societal expectations of privacy, new methods for collecting, storing, aggregating and sharing information continue to push the boundaries of our legal frameworks. As a result, we are now seeing:
These issues and events create significant risks for any company caught unprepared in the social-mobile data frenzy.
Tip of the Iceberg
As companies increase their efforts to collect, use and share social-mobile data, they should expect legal challenges to increase.
Last year, The Wall Street Journal examined 101 popular smartphone applications and found that more than half transmitted a phone's unique identifier to third parties without users' permission, and 47 sent the phone's location to third parties. Five apps went further, sending users' gender, age and other personal data to third parties. Negative publicity and several lawsuits against the companies publishing these apps have heightened awareness, but the problem hasn't abated. A recent patent application filed by
pricing ads based on information derived from consumers' browsing and searching activities, and the contents of their media library. It also describes using the contents of friends' media libraries to better target ads, and explains how
If these examples seem extreme, consider that IBM recently announced a new retail technology that enables stores to offer targeted third-party products and services to consumers at checkout. The solution allows shoppers who use mobile devices to scan orders, redeem digital coupons, access loyalty points and pay for orders at self-service pay stations. The related compliance issues are significant for retail establishments large and small.
Complicating the issues is the pervasive legal ambiguity and inconsistency as to what information is protected and subject to regulation among jurisdictions. There has also been an expansion in the definition of protected private information. For example, the California Supreme Court, in
Unfortunately, most companies still view social-mobile data as marketing information, not as private, and protected, records. But along with the ability to tie this data to specific individuals comes the need to treat it as other private information is treated. This is especially true when the data is used for purposes unrelated to why it was originally collected.
Best Practices: Seven Privacy and Risk Priorities
To avoid privacy-related lawsuits targeted against the use of social-mobile data, it's vital that companies have a clear plan about:
Seven best practices for counsel to keep in mind follow.
1. Visit your own websites and social-media pages, and download and use your company's apps. Give as much attention to what is on your public website and how your company is using customer apps ' especially the app license and use agreement ' as you do to the internal policies for records management, records training and legal-holds training.
2. Pay special attention to “digital safes” and other tools that store personal and private customer information. How is this data managed and what practices, processes and controls are in place to properly manage and protect it? It is especially important to consider what is implied by your brand (are you a security company, for instance?) or explicitly found in your marketing materials.
3. Have a conversation with your CMO soon. Just as you engaged with IT a few years ago, you now need to engage the marketing department. What are its business goals? What is it doing and what is it planning for next year, especially in the area of customer engagement and social-mobile apps?
4. Revisit your privacy policy, based on what your company is actually doing. Then “operationalize” your policies: Design them for execution rather than aspiration; that is, engage with the lines of business and those in the IT organization that will be enforcing the policies.
5. Modernize your records-and-retention program. Provide meaningful, actionable guidance on what information to retain, how to retain it, how long to retain it and where to retain it. Provide procedures, not just policies, on what can and cannot be done with information during retention.
6. Understand the sources and atomic structure of today's highly complex information. Where does it originate? What form does it take? Who has access to it over its life? How is it assembled and aggregated? How is it used and reused? Is it sold, bartered or shared with third parties? How can it be dismantled for disposition?
7. Work with the Chief Information Officer to design governance and disposal into IT systems, instead of trying to apply it after the fact.
While today's privacy environment is highly complex and dynamic, a well conceived plan and thoughtful dialogue with all involved and concerned, or who could be, can help you on your journey.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.