Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Compared with the rest of the world, the United States has historically been a more open framework when dealing with information. Social media has made even the most mundane and possibly personal pieces of data available to many with a press of a finger. Such an open relinquishment of private information is almost assumed and has become part of the American culture. Those who think about how easy it is to access data understand how their own data has become part of the searchable cyberspace.
The European culture and laws are different. Privacy rights are assumed, information confidentiality is maintained, and the concept of the United States “discovery” is scorned. There is a concern that European sensitive data should stay outside of the United States because the protection of such data in the U.S. is not sufficiently strong. It is therefore not a surprise that the laws in the United States and in Europe are inconsistent when it comes to cybersecurity.
Cybersecurity Law in the United States
The most significant piece of federal legislation in this area is the Cybersecurity Information Sharing Act (CISA), passed in December 2015 (Division N of the omnibus spending bill). The purpose of this Act, purportedly, is to promote information-sharing between the government and the private sector for issues relating to cybersecurity and new threat vectors. The idea is that sometimes industry is aware of new viruses or technical threats, but does not share the information with the government so that the government may protect itself and/or inform the public. CISA creates a voluntary means for companies to share their threat data with the government.
There are problems with sharing this information. While the act of sharing appears to be protected by statute, the underlying problem may not be. If I see a threat to my system, I could tell the government about that threat and the act of telling would not create a new cause of action. But, the law is not clear as to whether that sharing could then lead to a lawsuit relating to the cause of the sharing. Stated another way, I can tell the government I have a virus, and telling the government should not in itself expose my company to liability. But, I could later get sued for failing to comply with certain cybersecurity requirements because my system was infected with a virus and I did not take proper steps to protect the data.
So, trying to comply with United States laws alone creates a dilemma. But if you consider complying with CISA, you may also expose yourself to legal issues in Europe.
European Laws on Cybersecurity
Disclosure of personal data (capable of being used to identify a living person either on its own, or in conjunction with other data in the possession of the person controlling how the data is used) relating to EU nationals could cause serious potential issues in light of recent developments overseas. Previously (before January 2016), many organizations relied upon the approved “Safe Harbor” regime framework developed by the Department of Commerce (DoC) in the United States and the European Commission, under which organizations could self-certify that they adhered to its principles. The certifying company gave binding promises that they complied with privacy policy requirements and provided protections for personal data that were sufficiently high that transfers of personal data from the EU to the United States would be permissible under the applicable Data Protection Directive (the Directive).
However, the Safe Harbor regime has suffered a huge blow by virtue of a recent decision in the Court of Justice of the European Union (CJEU). See, Maximillian Schrems v. Data Prot. Comm'r, ECLI:EU:C:2015:650, CJEU 6 Oct. 2015, Case C-362/14. Maximillian Schrems was an Austrian citizen who had been a Facebook user since 2008. Facebook habitually transferred some data provided by its EU-based subscribers from its Irish subsidiary to servers located in the United States. Schrems lodged a complaint with the relevant supervisory authority in Ireland on the basis that the law and practice in the United States did not provide sufficient protection in relation to his data.
Initially, Schrems' complaint was rejected, particularly on the basis that the Safe Harbor regime ensured sufficient protection. However, on referral to the CJEU, the court held that the powers available to national supervisory authorities cannot be eliminated just because the European Commission originally decided that the Safe Harbor scheme provided such protection. The authority must look at the situation independently and determine whether the transfer of a person's data to a third country complies with the requirements of the Directive.
CJEU then proceeded to consider the fact that public authorities in the United States are not subject to the Safe Harbor scheme. Further, national security, law enforcement and public interest all may prevail to the extent that a United States entity holding or processing data may be forced to ignore the requirements of the Safe Harbor scheme where it conflicts with any of the foregoing. As a result, data would not be protected in such circumstances and there were no clear limitations or restrictions on the public authorities' abilities.
In addition, there was no clear ability for individuals to pursue legal remedies in order to access their data or to have it rectified or erased, which the CJEU viewed as inherent in the existence of the rule of law and as compromising “the essence of the fundamental right to effective judicial protection.” The CJEU therefore held that the original European Commission decision that Safe Harbor privacy principles provided adequate protection was invalid ' effectively nullifying the Safe Harbor option.
What Now?
The Safe Harbor route is no longer a valid basis upon which personal data can be transferred from the European Union to the United States. But, there is not yet clear guidance as to what will replace it. Indeed, different data protection authorities (DPAs) have been taking different approaches to this evolving situation.
For example, the Information Commissioner's Office (ICO), the supervisory data protection authority for the United Kingdom, has been advocating that continued use of the Safe Harbor principles may still be a sensible proposition in the interim. The ICO further indicated it will not take enforcement procedures until an approved alternative to Safe Harbor has been determined. However, this guidance is not legally binding and the ICO is keen to reiterate that companies need to review their compliance processes and procedures.
This approach has been somewhat reflected in guidance from the Spanish regulator, which has indicated that it will not rush to take enforcement action against companies provided they are working on appropriate proposals and arrangements to ensure adequate protection of personal data. However, in stark contrast, the data protection authority in Hamburg, Germany has already made it public that it does not expect organizations to continue relying upon Safe Harbor and that it will take immediate enforcement proceedings against any that do continue to transfer personal data outside the EU in this way. Such proceedings could lead to fines up to '300,000 (roughly U.S. $340,000) per data breach.
Some Proposed European Solutions
The Article 29 Working Party (which is made up of representatives from the data protection authorities of the EU states) recently confirmed that it views use of binding corporate rules and model contract clauses as valid options to enable the transfer of data from the EU to the United States.
Binding Corporate Rules are essentially rules operated by an organization that put in place adequate safeguards for protecting personal data in line with the Article 29 Working Party's requirements. They are not, however, a quick fix ' as such rules require an application to, and approval from, the relevant data protection authority via a relatively cumbersome design and implementation procedure, which usually takes in the region of 12-18 months.
Model contract clauses are, on the other hand, considerably easier to implement provided both parties are in agreement. These provide for an approved set of contractual obligations that eliminate the requirement for the transferee of data to make their own assessment regarding the adequacy of the protections provided. There are different sets of clauses depending upon the parties' relationship and what they do with the data.
A further possibility is to obtain express consent to the transfer of the data. However, even the more relaxed data protection authorities are closely scrutinizing this route to effecting transfers, as the key concern is whether consent is specific enough for what is happening to the data and whether it provides any real protection to the individual. Much has been made in recent months of high-profile examples of data having been harvested from individuals on the back of a generic data consent and having then been retransferred, reused and resold multiple times in manners the individual who gave “consent” could not possibly have anticipated. Consent on its own may well not be enough.
Privacy Shield
The European Commission and the DoC have agreed upon a new arrangement, known as the “Privacy Shield,” as a replacement for the now defunct Safe Harbor scheme. The Privacy Shield is in fact a collection of principles including:
Although intended implementation for Privacy Shield was set for June 2016, there are still a number of criticisms being leveled by both politicians and commentators, so implementation will likely be delayed. In addition, the General Data Protection Regulations are upcoming (albeit not until April 2018), and these will bolster both the European Union's data protection authorities' powers (including the ability to impose fines of as much as 4% of global turnover in cases of breaches of data subject's rights) and their likelihood to crack down on enforcement.
Conclusion
Each organization needs to review its current compliance arrangements and re-evaluate on the basis of the above issues, implementing sensible interim solutions, at least, to avoid falling foul of the more aggressive data protection authorities and their willingness to impose potentially sizeable fines.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.