Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
On May 25, 2018, General Data Protection Regulation 2016/679 went into effect in the EU. Better known as the GDPR, EUGDPR.org calls it the "most important change in data privacy regulation in 20 years." Unlike a number of previous data privacy regimes, the GDPR came with a sharp set of teeth, calling for a fine of up to €20 million or 4% of the previous year's global turnover, whichever is greater. Companies were now on notice that they had to be extremely careful in how they responded to a data breach or face the consequences.
In addition to the GDPR in the EU, there are several pieces of legislation in the U.S. that seek to protect personally identifiable information (PII). These include: the Fair Credit Reporting Act of 1970, which addressed consumer information in the files of consumer credit reporting agencies; the Health Insurance Portability and Accountability Act of 1996, which contained provisions meant to safeguard a particular type of PII — personal health information (PHI); and the Gramm-Leach-Bliley Act (also known as the Financial Services Modernization Act of 1999), which seeks to control the ways financial institutions control private information of their clients.
Finally, the California Consumer Privacy Act (CCPA) is set to take effect on Jan. 1, 2020, with the goal of enhancing privacy rights and consumer protection for California's nearly 40 million residents. The CCPA carries with it a fine of between $100 and $750 per affected California resident. Going forward, entities doing business in the U.S., UK and globally need to ensure they have a process in place to respond if their data is ever compromised.
Each organization will plan a response to fit its size and structure. Internal stakeholders may include some or all of the following: chief financial officer, chief technology officer, the data protection officer or data privacy team, IT, legal, compliance and human resources. External support comes from outside counsel, where one law firm will suffice or multiple firms will be engaged depending on geographic scope and political issues. A technology vendor with the requisite forensic expertise will be able to determine what happened, how and to what extent.
The last external party is in some ways overlooked but nevertheless the most important: A managed document review vendor can quickly and accurately review the information that was affected by the breach to determine what PII might have been implicated and to whom it belonged in order to help all the others stakeholders assess risk, shape the response and, where required, notify regulators and potentially impacted individuals. This article focuses on why including a managed document review vendor in your incident response plan is critical.
Responding to Data Subject Access Requests (DSARs) under the GDPR are the type of PII review that is the most similar to a regulatory or litigation document review in that the data has not yet been produced to the requesting party and any PII or sensitive personal data, or SPD, other than that of the Data Subject will need to be redacted before being produced to the Data Subject. To the extent an organization deals with a constant stream of DSARs in the regular course of business, a managed document review provider will be able to put a process in place to standardize and streamline the review process, and leverage technology to the extent possible to reduce manual effort associated with the required redactions.
Other data privacy reviews — data breach, incident response, PII review, cyber reviews — have the opposite focus: the goal is not to redact PII before it is produced, but to review a corpus of documents that have presumptively been exposed and then to expeditiously determine the extent of the exposure. As such, the impacted organization will need to identify individuals whose PII may have been exposed as quickly and completely as possible, including a report listing the potentially impacted individuals, their contact details and the categories of PII that were potentially exposed, including whether any were minors.
There are a number of factors that go into this analysis, and a managed review vendor has to be nimble enough to deal with any and all the client and counsel deem necessary for a particular review, including:
Companies need to insure that under the various data privacy regimes in the U.S., the EU and around the world, they are doing their best to plan for the worst-case scenario — a data breach. A key part of constructing the team to implement this plan is to identify a managed document review provider that has developed an expertise in PII reviews in the data breach/incident response context. Such a provider will be able to deal with the challenges of scope, timing, scale, identifying notifiable PII and preparing a notification report so that the company and its counsel can quantify and manage its risk quickly and accurately.
*****
Andrew Goodman, Associate Vice President of Litigation Services, QuisLex, has over 20 years of experience actively managing and supervising large-scale, complex document reviews in numerous industries and practice areas. He has trained multiple large teams on document review and creating privilege logs, and is currently responsible for spearheading QuisLex's litigation training programs. He also manages key aspects of QuisLex's client and vendor relationships. Andrew frequently speaks on topics related to e-discovery and legal project management. He received his J.D. and M.B.A. from Washington University in St. Louis and earned a B.A. with honors from the University of Michigan.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.
This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.
For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.
In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.
Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.