Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
On May 25, 2018, General Data Protection Regulation 2016/679 went into effect in the EU. Better known as the GDPR, EUGDPR.org calls it the "most important change in data privacy regulation in 20 years." Unlike a number of previous data privacy regimes, the GDPR came with a sharp set of teeth, calling for a fine of up to €20 million or 4% of the previous year's global turnover, whichever is greater. Companies were now on notice that they had to be extremely careful in how they responded to a data breach or face the consequences.
In addition to the GDPR in the EU, there are several pieces of legislation in the U.S. that seek to protect personally identifiable information (PII). These include: the Fair Credit Reporting Act of 1970, which addressed consumer information in the files of consumer credit reporting agencies; the Health Insurance Portability and Accountability Act of 1996, which contained provisions meant to safeguard a particular type of PII — personal health information (PHI); and the Gramm-Leach-Bliley Act (also known as the Financial Services Modernization Act of 1999), which seeks to control the ways financial institutions control private information of their clients.
Finally, the California Consumer Privacy Act (CCPA) is set to take effect on Jan. 1, 2020, with the goal of enhancing privacy rights and consumer protection for California's nearly 40 million residents. The CCPA carries with it a fine of between $100 and $750 per affected California resident. Going forward, entities doing business in the U.S., UK and globally need to ensure they have a process in place to respond if their data is ever compromised.
Each organization will plan a response to fit its size and structure. Internal stakeholders may include some or all of the following: chief financial officer, chief technology officer, the data protection officer or data privacy team, IT, legal, compliance and human resources. External support comes from outside counsel, where one law firm will suffice or multiple firms will be engaged depending on geographic scope and political issues. A technology vendor with the requisite forensic expertise will be able to determine what happened, how and to what extent.
The last external party is in some ways overlooked but nevertheless the most important: A managed document review vendor can quickly and accurately review the information that was affected by the breach to determine what PII might have been implicated and to whom it belonged in order to help all the others stakeholders assess risk, shape the response and, where required, notify regulators and potentially impacted individuals. This article focuses on why including a managed document review vendor in your incident response plan is critical.
Responding to Data Subject Access Requests (DSARs) under the GDPR are the type of PII review that is the most similar to a regulatory or litigation document review in that the data has not yet been produced to the requesting party and any PII or sensitive personal data, or SPD, other than that of the Data Subject will need to be redacted before being produced to the Data Subject. To the extent an organization deals with a constant stream of DSARs in the regular course of business, a managed document review provider will be able to put a process in place to standardize and streamline the review process, and leverage technology to the extent possible to reduce manual effort associated with the required redactions.
Other data privacy reviews — data breach, incident response, PII review, cyber reviews — have the opposite focus: the goal is not to redact PII before it is produced, but to review a corpus of documents that have presumptively been exposed and then to expeditiously determine the extent of the exposure. As such, the impacted organization will need to identify individuals whose PII may have been exposed as quickly and completely as possible, including a report listing the potentially impacted individuals, their contact details and the categories of PII that were potentially exposed, including whether any were minors.
There are a number of factors that go into this analysis, and a managed review vendor has to be nimble enough to deal with any and all the client and counsel deem necessary for a particular review, including:
Companies need to insure that under the various data privacy regimes in the U.S., the EU and around the world, they are doing their best to plan for the worst-case scenario — a data breach. A key part of constructing the team to implement this plan is to identify a managed document review provider that has developed an expertise in PII reviews in the data breach/incident response context. Such a provider will be able to deal with the challenges of scope, timing, scale, identifying notifiable PII and preparing a notification report so that the company and its counsel can quantify and manage its risk quickly and accurately.
*****
Andrew Goodman, Associate Vice President of Litigation Services, QuisLex, has over 20 years of experience actively managing and supervising large-scale, complex document reviews in numerous industries and practice areas. He has trained multiple large teams on document review and creating privilege logs, and is currently responsible for spearheading QuisLex's litigation training programs. He also manages key aspects of QuisLex's client and vendor relationships. Andrew frequently speaks on topics related to e-discovery and legal project management. He received his J.D. and M.B.A. from Washington University in St. Louis and earned a B.A. with honors from the University of Michigan.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.