Privacy Law – How Do You Verify the Identity of a Data Requestor?

The California Consumer Privacy Act (“CCPA”) was enacted in early 2018 and will go into effect in 2020. Among many concerns about the ability of small businesses to comply with obligations imposed by the CCPA is the requirement that a company allow Californians to access the information held about them, or, in some situations, request that the information that they provided to a company be deleted.  Whether or not your practice involves regular questions of Privacy Law, your clients may be asking you about the CCPA.  By keeping data minimization objectives in mind and not over-thinking compliance obligations, verifying the identity of a data requestor may be straight-forward.

 

The ability to control how one’s data is used is a cornerstone of the CCPA. However, this puts a burden on a business to ensure that only a “verified” consumer accesses the requested data and avoid fraudulent requests. To access or delete information, a consumer must submit a “verifiable consumer request.” While the term implies that a business must take steps to “verify” the individual making the request, the CCPA does not specify what steps it considers to be sufficient (or that it considers to be inadequate) to accomplish the verification.

 

With little to go on, a business might be tempted to act over-cautiously and require more information than is actually necessary to verify identity.   With data minimization principles in mind, it is important to recognize privacy risks to avoid.  Don’t over-reach; avoid obtaining more sensitive or potentially harmful information than is necessary to complete the request.  Also, avoid asking for sensitive documents such as a passport.

 

A good rule of thumb is try to use the same method that was used to gather the data in first place. For example, your client operates a consumer website featuring information and users are required to provide a username and password to register with the site. Ask the requestor to provide a username and password to verify. If two-factor authentication was used, then challenge that requestor using the same method. Don’t ask for a driver’s license.

 

If a client is asking for additional resources on how to implement policies and procedures, it is useful to look to industry-standard references, such as  NIST. A good (but technical) explanation Guidelines on verifying identity.  If this is too technical, a client should work with a consultant who can explain the framework. One valuable upside is that if a business is required to respond to a regulator or litigant, the business can point to use of the industry standard as reasonable basis for compliance efforts.

 

Are you tasked with advising a client how to craft a CCPA policy or procedure? There is no requirement that companies create a written policy for processing requests. If a company chooses to create an internal policy or procedure for handling data access and deletion requests, the following four topics are relevant:

 

  1. Data subject verification. Before taking any action, a company should verify that the individual that submitted the request is the individual to whom the data belongs. Verifying identity depends upon the type of data maintained. Remember, if the requestor signed up with a username and password, use this to verify.

 

  1. Communications. A business must respond to a requestor, even if the request is a denial. To streamline a timely response, a company may choose to create template communications and procedures.

 

  1. Evaluating the request. The right to be forgotten is not an absolute right. Some companies choose to include a discussion of when the right does, and does not, have to be granted within their internal policy or procedure. If refused: Reply with a reason and provide options: regulator, court?

 

  1. Completing a Request. Upon verification of the identity of a requestor and a determination that a deletion request should be granted, a business can include instructions for technical steps that should be taken in order to erase an requestor’s information.

 

For clients implementing processes and procedures to respond to individuals who invoke their rights under the CCPA, meeting the requirement to verify the requestor’s identity (and reduce the risk of complying with a fraudulent request) can present a risk. However, with data minimization objectives in mind, using verification methods that make sense in the context of the requestor’s data, may reduce some of the burden of verifying the identity of a data requestor.

 

FOR EDUCATIONAL PURPOSES ONLY. NOT LEGAL ADVICE.

Recent Court Decisions Provide Some Clarity in Ever-changing Techlaw Landscape

As every CIO knows, today all business is digital business.  From the corner mom and pop bodega using Square to process credit cards up to Cisco Systems global network of devices supporting Zetabytes of data over an increasing number of devices.

What began as largely static website e-commerce at the turn of the millennium is now every day operations across multiple devices and the many different brands of platform and content delivery network.  In case you missed it, two recent cases will have a wide impact regardless of industry period

Law Enforcement Access To Cell Phone Location Data Requires Warrant

In the case of Carpenter v. United States, the Supreme Court ruled that law enforcement must obtain a warrant to have access to location and other data contained on a suspect’s cell phone.  In case you’re not familiar with the case, the facts in the Carpenter case are worth mentioning. In 2011, the government, conducting a criminal investigation in Detroit, obtained months’ worth of time-stamped records known as cell-site location information (CSLI) for suspects.  Wireless carriers produced CSLI for petitioner Timothy Carpenter’s phone, and the Government was able to obtain 12,898 location points cataloging Carpenter’s movements over 127 days—an average of 101 data points per day.  Carpenter moved to suppress the data, arguing that the Government’s seizure of the records without obtaining a warrant supported by probable cause violated the Fourth Amendment.  The District Court denied the motion, and prosecutors used the records at trial.  Carpenter was convicted, based in part on the cell-site records, and he appealed. holding that the government’s acquisition of historic cell-site location information (HCSLI) – at least to the extent it includes 7 days or more of cell-site records – was a search and thereby required a warrant.

In reversing the conviction, a majority of the Court has recognized that individuals have a reasonable expectation of privacy in the whole of their physical movements and a warrant is required only in the rare case where the suspect has a legitimate privacy interest in records held by a third party.  The Court downplayed the significance of its ruling, calling its decision “a narrow one” that “does not express views on “real-time CSLI” or question the application to … a range of other information-gathering tools, such as security cameras.”

What this means for business.  While pundits are wisely praising the decision as a victory for privacy, I for one, do not believe it applies that broadly. Even so, there is a tangible benefit for corporate counsel at technology companies, especially those that maintain location information about their customers. Lawyers and compliance pros will feel some relief knowing that they do not have to scramble, prevaricate or litigate with law enforcement when a company receives a subpoena or other demand for location data without a warrant attached.

For additional views on this decision, please see an article from the International Association of Privacy Professionals here, and another from the Electronic Frontier Foundation here.

States Can Now Require That Internet Retailers Collect Sales Tax

The other notable decision to come down from the Supreme Court involves the long-simmering issue of state taxation on internet sales.

The decision, in South Dakota v. Wayfair Inc., was a victory for brick-and-mortar businesses that have long complained they are put at a disadvantage by having to charge sales taxes while many online competitors do not. And it was also a victory for states that have said that they are missing out on tens of billions of dollars in annual revenue.

The South Dakota Legislature enacted a law requiring out-of-state sellers to collect and remit sales tax “as if the seller had a physical presence in the State” to address the erosion of its sales tax base causing a corresponding loss of critical funding for state and local services (“Act”).  The Act covers only sellers that, on an annual basis, deliver more than $100,000 of goods or services into the State or engage in 200 or more separate transactions for the delivery of goods or services into the State.  Top online retailers with no employees or real estate in South Dakota who met the Act’s minimum sales or transactions requirement, but do not collect the State’s sales tax opposed the Act. South Dakota filed suit in state court, seeking a declaration that the Act’s requirements are valid and applicable to respondents and an injunction requiring respondents to register for licenses to collect and remit the sales tax. At trial and on appeal, courts held that the Act is unconstitutional.

The ruling effectively overturned a system that it created.  In 1992, the Supreme Court held that the Constitution bars states from requiring businesses to collect sales tax unless they have a substantial connection to the state. That case was Quill Corporation v. North Dakota.  The Quill decision helped pave the way for the growth of online retail by letting companies sell nationwide without navigating the complex patchwork of state and local tax codes.

South Dakota’s attorney general, called the ruling “a big win for South Dakota and Main Streets across America.”  The case should benefit both rural businesses where local businesses have been hit hard by competition from online retailers and municipal coffers as well, because in some states local sales taxes are collected at the state level.  Owners of brick-and-mortar stores like the decision as a means of leveling the playing field because they feel they often missed out on sales of big-ticket items since sales tax could have had an amplified effect on the price.  For consumers, this could mean paying more for products bought online.  Although most have a “use tax” that works like a state sales tax for online purchases, few if any consumers actually pay it.

Since the beginning of my practice in 1999, I suggested businesses take a state-by-state approach when it comes to issues like sales tax, since it can vary widely by jurisdiction.  No business is entirely virtual. All businesses will need to examine their ecommerce strategy to see whether and to what extent this case affects the business model.

Technology, Innovation and the Law

In today’s world, business is no longer about simply having an online presence. Digital business is transactional and social across platforms and networks across thew globe. The previous model of one-to-one transactional business relationships has evolved to one that is reciprocal, collaborative and highly interactive.

This new level of engagement is not without risks. As businesses expand into new online areas for marketing and commerce, businesses should be aware of a myriad of laws and risk areas implicated when one conducts business online. Business lawyers must be familiar with Technology Law.

There are a wide variety of services around the most common types of content and businesses need legal disclaimers, protection of intellectual property rights and other ways to limit liability.

Generally, the key areas and issues are:

Trade & Commerce Issues

  • Advertising & Promotions Laws (these vary by state)
  • Affiliate Marketing Agreements/Relationships
  • Federal Regulatory Guidelines
  • Industry Regulations & Guidelines
  • CAN-SPAM Act
  • Online Contracts/Terms of Use (Click-Wrap/Browse-Wrap Agreements)
  • Disclaimers
  • Limits of Liability
  • Sales & Taxation/Clarifying Nexus Confusion
  • Choice of Law/Forum
  • Insurance Law
  • Website Representations and Warranties

Intellectual Property Issues

  • Copyright & Digital Millennium Copyright Act
  • Defamation/Free Speech
  • Trademark Law
  • Unfair Internet Business Practices Such as Domain Name Hijacking & Cybersquatting
  • Anti-cybersquatting Consumer Protection Act
  • Linking/Scraping/Crawling
  • Patent Law
  • Licensing
  • Trade Secrets

Privacy & Security Issues

  • Credit Cards / Transaction Processing
  • E-Payment and Credit Card Security/Privacy
  • Children’s Online Privacy Protection Act
  • Data Breach Notification Laws
  • Data Privacy Laws

Human Resources & Employment Issues

  • BYOD & Computer Usage Guidelines for Employees
  • Employment and Labor Laws
  • Social Media Guidelines for Employees

We look forward to the opportunity to discuss any questions you may have regarding the range of business, technology and intellectual property services we offer. Our law office is based in Chicago, Illinois. Please feel free to call us at (866) 734-2568 should you have any questions.

Advanced Issues in Contracts for Interior Designers

Every business transaction is governed by contract law, even if the parties don’t realize it. Despite the overwhelming role it plays in our lives, contract law can be incredibly difficult to understand.

Successful Interior Designers know how to manage the legal needs of the business while bringing a creative vision to life for a client or project. Confusion about rights, obligations, and remedies when things go wrong can strain and even ruin an otherwise promising professional relationship.

This program teaches new designers and entrepreneurs answers to some basic questions, such as:

  • What to do when clients / vendors / contractors don’t pay?
  • How can one use Indemnifications, Disclaimers and Limitations of Liability clauses to balance business risk when the parties may not be economically balanced?
  • What types of remedies are available and what are the limitations in scope for certain types of monetary and “equitable” remedies?

Take a deeper dive into advanced issues for interior design professionals. Learn how contracts can protect your design business and how to safeguard your rights.

Qualifies for .1 CEU credit.

This program was originally delivered on Aug. 17, 2017 at the Design Center at theMART 14th Floor Conference Center, 222 Merchandise Mart Plaza, Chicago, IL 60654

TRENDS IN DIGITAL MARKETING

Digital Healthcare Continues to Evolve

Widespread distribution of digital communications technology (phone, tablets, ultra-portable laptops, gaming devices) has changed the nature of marketing. However, medical practices and other healthcare providers are reluctant to use digital marketing techniques. While most industries move away from the distribution of massive, shotgun-style email and snail-mail campaigns and toward targeted, social media and demographic-driven efforts healthcare marketing is falling behind.

Digital marketing execs face many challenges getting the message and media mix right. Early adopters provide a look into the changing nature of marketing. From a pragmatic perspective, there are barriers to entry for digital healthcare marketing efforts (privacy, regulatory), the growing use of content marketing (native, branded), social marketing, and electronic marketing strategies (email marketing, online scheduling, etc.) in the healthcare field and customer-oriented services that can be a strategic use of the Internet for marketing to providers, patients and third-party service providers.

The evolution of healthcare marketing toward greater use of “native,” sharable and relevant content provides both obstacles and opportunities in acquisition and use of third-party media content.

Use of content marketing is increasing.

On average, 35% of all marketers use print magazines, but 47% of healthcare marketers use them. In print, 28% of marketers use print newsletters compared to 43% of healthcare marketers, and 26% of marketers use print for annual reporting compared to 36% in healthcare. When it comes to using blogs, 74% of all marketers use blogs compared to only 58% in the healthcare industry. The situation is similar for social networks, with an interesting exception – 71% of healthcare marketers make use of YouTube, more than the average of 63%. This is likely because healthcare professionals use YouTube to televise procedures and interview doctors.

By now marketers should be accustomed to using their own creative content. However, focusing on owned assets like a website and email won’t move the needle enough to impact the bottom line. As a result, healthcare marketers are integrating new content (in the form or “advertorials” or “native” content). This in turn is developed alongside a long-term SEO strategy.

Native advertising distributes “sponsored” content on relevant pages, delivering relevant content to the right audience in a way that is non-intrusive and integrates with the user experience.

Native Content often involves use of product/service reviews and endorsements. It is important to include proper disclosures when using native content. The FTC will initiate enforcement actions against marketers that deceive consumers.

In the Matter of Son Le and Bao Le, the FTC charged that the two brothers deceived consumers by directing them to review websites that claimed to be independent but were not, and by failing to disclose that one of the brothers posted online product endorsements without disclosing his financial interest in the sale of the products.

Best Practices EU/US Privacy Shield

In case you missed it, Ken Dort at Drinker Biddle held a discussion covering high points of the EU/US Privacy Shield. Talking points covered:

1. Application Overview
2. Certification Issues
3. Privacy Shield Principles and Supplemental Principles
4. Implementation Timelines (Expected)
5. Best Practices Going Forward Pending Implementation

The draft EU-U.S. Privacy Shield “adequacy decision” includes the Privacy Shield Principles companies must follow. Suggested Best Practices for compliance with EU-U.S. Privacy Shield Principles include: evaluating disclosures about data collection and use to determine whether they are sufficiently clear and evident to consumers, and 2) giving strong consideration for implementation of a formal opt-in mechanism. European government trade regulators are concerned about whether consumers are being sufficiently informed about the nature and scale of data collection.

Ken graciously provided this great list of resources for the discussion:

* Full text of the Privacy Shield can be found here.

* European Commission draft adequacy decision can be found here.

* Department of Commerce Fact Sheet can be found here.

* European Commission Fact Sheet can be found here.

* European Commission FAQs can be found here.

* Statement from U.S. Secretary of Commerce Penny Pritzker on release of the Privacy Shield text can be found here.

* European Commission statement on the Privacy Shield text can be found here.

Article 29 Working Party statement on the Privacy Shield can be found here.

As part of Adler Law Group’s Privacy & Information Security Practice, we continue to follow the developments in this area. We can help you review, enhance and adopt standardized contracts and implement methodologies for approaching these challenges by setting objectives, determining scope, allocating resources, and developing agreements that will efficiently and effective manage risks.

Adler Quoted in BNA’s Electronic Commerce & Law Report

A recent article by Alexis Kramer, Legal Editor for Bloomberg BNA’s Electronic Commerce & Law Report, examines the nature of social media platform messenger applications and the move into e-commerce. This shift raises the implications for policing counterfeit goods and enforcement of online purchases.

The article entitled “E-Commerce May Come to Messaging Apps; Watch for Counterfeits and Contract Issues” highlights that “[b]uying and selling goods through messenger apps” … “is definitely the future of mobile.”

David M. Adler was interviewed for the article for insight around ecommerce legal issues, which include intellectual property and contractual issues, that arise when consumers transact business through messenger apps. Many of these issues were identified in his article Pinterest “Buyable Pins” And Ecommerce Liability.

The legal risks and issues vary widely depending on industry and product/service mix and encompass many interrelated areas of the law. Specifically, Adler inditified five main areas of concern for ecommerce, especially on mobile devices and/or through messenger apps:

  1. Trade & Commerce Issues (Brand protections)
  2. Online Agreements (limitations of liability)
  3. Intellectual Property Issues (content ownership and use)
  4. Privacy & Security (data gathering, usage, storage & sharing)
  5. Human Resources & Employment Issues (reputation and social media use)

Facebook, WeChat, Instagram, Snapchat, Twitter and other social networks already allow users to send payments to one another through private messages. New tools such as the Pinterest “Buy Now” pin, and Twitter’s direct messages, facilitate commercial transactions with consumers.

As the article notes “enabling retail transactions via chat” opens the door for more counterfeit goods, difficulty monitoring the sales channel, increasing difficultly of enforcing online purchase terms, and lack of visual space to properly notify customers of the terms and conditions.

‘‘All the issues you would have when conducting transactions over the Internet are magnified when you’re using a messenger app,’’ David Adler, principal of Adler Law Group in Chicago, said.