Wednesday, December 31, 2014

Cloud Computing is like online dating....

Cloud computing, incorporating Platform, Software, and Infrastructure as services (PaaS, SaaS, IaaS), has long been a topic of discord and interest. I think that I am an anomaly among privacy professionals in that I embrace cloud technology and have since I first faced it as a privacy officer in a work environment.

Why?

Because cloud technology offers advantages to enable entities to focus on their core business. It, being cloud technology, offers the ability to scale, store, be faster, stronger, and leap tall buildings in a single bound - well, okay, so you may not be able to successfully do everything, but it sure opens possibilities.

It is not a magic pill, but it is (hopefully) a long-term relationship.

Online dating. I met the love of my life that way, and so far, we have been just ducky!



1.   Once you decide to enter the online dating field, do your research. What do you want out of it? How much do you want to put into it? What is your risk and your risk appetite? How much of yourself are you willing to share?

2.   Create a profile of what you are looking for. What do you want your new partner to look like, act like? What are their specialties? How much do they make? Are these preferences or hard lines?

3.   Go live and enter the field! Don't get excited, this is by far not your last step.

4.   Now you start screening with the information that the potential mates have made available. You may not like what you see, so those are easy enough to screen out. But if they look attractive/sound appealing, be careful. They don't deliberately put out bad information.

5.   Here is where you make a decision - do you start talking to all of those who are appealing? or do you do further research?  It depends on whether you want the experience of getting to know a wide range of vendors or if you are sincerely just focused on finding the right partner for a specific, identified need. (I don't judge here - it's your need.)

6.   Once it looks like you may have found the perfect mate or at least a few potential ones who could be your perfect mate, meet them in person. Look past the courting to the substance; but do make sure they do the fancy courting - you deserve it. If they cannot afford it, find out why. But don't discount the poor ones, just because they are poor. Ask the hard questions.

7.   Narrow down your selection and get to know each of them intimately (again, no judging. your level of intimacy is your choice.) Put them through a trust test. Introduce them to your friends and family (key stakeholders, compliance, etc.).

8.   Meet their friends and family - and importantly, their current and former mates. You really do not want this to be a monogamous relationship. If their entire business or a significant portion of it depends one mate, then they may not survive the loss of that mate. In this, polygamous love is a good thing.

9.   Heart, head, or gut.. Make a choice. I recommend going with the head over the heart, but sometimes the gut also works. Seriously, this choice should not be made lightly. Bring all of your evaluation tools to bear and be skeptical.

10.   Have an exit strategy. Make sure your prenup is strong. Hopefully, you never need it, but be prepared for the worst.

Good luck and may the goddesses of love and clouds be on your side.

Thursday, November 6, 2014

oh no - a high school student asked me to explain what I do in privacy law...

Today, a high school student I mentor asked me to explain my job and privacy law...so I did. My response is below. It may not be academically extraordinary, but it gets the basics...

So in privacy, there are two approaches in law - the U.S. way and the rest of the world. The U.S. approaches privacy from a sectoral basis - you get a right to privacy of your information depending on the sector. Patients have HIPAA. Students have FERPA. Financial/banking/credit card customers have FCRA, GLBA, etc. A lot of acronyms - but the acronyms are not important. The key is that there is not a general right to privacy of your personal information. Almost all states, however, have data breach laws. So they are not privacy laws per se, but rather if certain protections are in place, a breach may not require notification to individuals, state authorities, regulators, etc. Therefore, many companies put in these protections which results in some privacy protections. 

The rest of the world, which is not all countries, but a whole lot of them, protect personal information on all people. In Europe, privacy is a fundamental right. Health information may be subject to more stringent protection, but not because of a law like HIPAA, but because health information is more sensitive - but so is ethnicity, banking information, etc. The European Economic Area has data transfer requirements, which mean that personal information is not permitted to cross the European borders unless certain protections are in place. EU assesses other countries' laws to see if their data protection laws meet the EU standards - if so, the country is deemed adequate and data can be transferred from the EU to that country. Only 14 countries have received an adequacy determination, meaning all other countries have to use a data transfer mechanism. Moving data across the borders does not just mean physically, it also means electronically. So a European accessing their email while outside Europe is actually transferring data across the borders. When you consider that many companies operate across EU borders (facebook, google, yahoo, linkedin, microsoft, etc.) then you understand how significant this is. So the US worked with the EU to create the EU-US safe harbor. US companies can self-certify to a set of standards and be deemed adequate like a country would be. The EU regulators are starting not to like this process, especially in light of the Snowden and NSA scandals last year. But - over 3000 US companies follow this. If you follow the news, you will see a lot about EU data issues involving the "Silicon Valley" companies - it comes down to a difference in philosophy about how personal data is handled. So it would hurt commerce between the US and EU if the safe harbor was eliminated. 

The other transfer mechanisms are traditional ways (model contract clauses, consent, etc.) which are burdensome to manage, track, review, and actually use on a practical level. The mechanism we went with is the BCRs: Binding Corporate Rules. This mechanism is like the gold standard for data transfers, because a company must develop policies to protect personal data on many different aspects - only collecting what is strictly needed, protecting individuals' rights to access and correct their data, deleting data when no longer needed, training personnel, etc. The data protection authorities in Europe have to review your application and approve it. It is quite lengthy and time-consuming - not to mention what it takes to put all the policies in place to begin with. When we started the process in 2012, there were only 19 companies in the world who had taken this step. We were approved (EU calls the success as a closed application) this year and there are 60 companies approved now. 

Many other countries have data protection laws, but they differ in many aspects - even though there are foundational similarities. The EU is considered the most stringent multinational privacy laws. The Asia Pacific countries are currently very active in creating and improving their privacy laws and South America is also really building some impactful laws, too. Canada and Mexico have really strong privacy laws - and I mention them because they border the US. What companies do in the US, they usually also roll out to Canada and sometimes Mexico. But the privacy requirements are quite different between US and Canada - and US and Mexico. 

... and that is a primer in global privacy law. :)

And yes, I have people that ask exactly what do I do that occupies me 40 hours a week. It's so funny if it weren't so sad. I have plenty to keep me busy! 

Wednesday, August 13, 2014

Implementing a Global Whistleblowing Program

Last month, I co-presented a short webinar with Jana Anderson, Partner, Foley & Lardner on implementing a global whistleblowing program with the Health Law Committee of ACC. If you are a member of the Association of Corporate Counsel, you can download the slides and materials here.

You may be asking yourself, why is a privacy attorney speaking to whistleblowing?

Believe it or not, many of the impediments to an effective (and legal) whistleblowing program are related to privacy laws and/or underlying privacy reasons.

Here are some of the highlights:

What is a whistleblower?

  • Ralph Nader coined the phrase in the early1970s to avoid the negative connotations found in words such as "snitches” or “tattle-tells.” 
  • Whistleblowers report perceived violations of a law by an entity (govt., private, educational, etc.) 
  • Whistleblowers are typically employees due to the need for insider knowledge. 
    • Internal – acts within entity to prevent/report violations 
    • External – reports externally, reward system 
Recent cases:

  • Medtronic Inc.’s recent settlement involved a business development manager as the whistleblower, who will receive $1.73 million as part of a $9.9 million settlement. 
  • Omnicare’s recent FCA actions involve a former collection manager and a former customer support employee as whistleblowers. 
  • Halifax Health Medical System’s recent Stark settlement for $85 million was a result of a qui tam suit brought by a former compliance officer for the system. 
The views on whistleblowing between the U.S. and other countries are vastly different. Here in the U.S. we view it as the right to keep businesses honest, to expose fraud, and to enforce compliance. Other countries view it as betrayal and that the U.S. is trying to govern business in their countries.

The laws that impact a global whistleblowing program fall into six categories. I give credit to the fabulous Don Dowling, Jr. of White and Case for his work in this area. Most of my knowledge in this area comes from intense study of his work.)

The six areas of laws that should be evaluated when implementing a global whistleblower program:
  • Mandating whistleblower procedures specifically
  • Requiring disclosures and cooperation with authorities
  • Restricting reporting hotlines (most especially anonymous reports or minor misbehavior)
  • Retaliation laws
  • Laws around internal investigations
  • Laws silent on whistleblowing, but programs possibly triggering data protection laws or work rules
Most of the legal implications are in Europe, which is no surprise given their fundamental right to personal data privacy.

Global whistleblowing programs fall into one of these categories:
  • One global program 
    • Meet both US law requirements and EU restrictions 
  • Two hotlines 
    • one in EU (meet SOX and most conservative EU country); another everywhere else 
  • Tailored hotlines to each local jurisdiction 
  • No EU hotline 
  • Informal EU reporting 
Last, a short checklist to implementing a global whistleblowing program (drawn heavily from Mr. Dowling's work):
  • Pay attention to EU particularly 
  • Check whistleblowing laws and privacy laws 
  • Disclose hotlines where required 
  • Secure data (calls, reports, investigations) 
    • That includes destroying the file after investigating 
  • Adhere to data transfer requirements 
  • Limit reporting topics to ensure proportionality
    • several nations only permit reporting of potential major criminal activity
    • Have routing for other reports that are not major crimes to a less formal process
  • Enable alternate reporting channels 
    • phones, emails, supervisor, HR, online
  • Do not encourage anonymity 
    • if you cannot bar anonymous in applicable countries, at least do not encourage or advertise it
  • Have a list of due process rights for accused 
  • Translations and multi-lingual operators should be easily available
  • Verify compliance, knowledge, capability of hotline vendor 

Friday, August 1, 2014

Sensitive PII - a shout out from Dan Solove

This blog entry by Dan Solove references information that I compiled about sensitive PII - that I also discussed briefly yesterday on this blog. Happy reading.

Wednesday, July 30, 2014

Sensitive Personal Information

Personally Identifying Information ("PII") is often defined by law. In the U.S., this generally occurs in sectoral law, such as the Health Information Portability and Accountability Act ("HIPAA").

But PII has layers, like an onion a la Shrek. There is your regular everyday PII, such as name, date of birth, and address. Then there is sensitive PII and sometimes even highly sensitive PII. These distinctions are generally found in countries other than the U.S. In addition, where sensitive information is being collected, there are generally laws or rules around having clear consent of the person to collect it as well as how this information can be stored, shared, used, transmitted, and protected. Let's explore these definitions and where they can be found.

For this exercise, I relied heavily on two publicly available resources:
What I am looking at here is what is considered sensitive PII ("sPII"). The laws or rules may not include a category of data called "sensitive personal information." For these purposes, if there are requirements to protect certain data at a higher level, then we will consider it "sensitive."

The typical definition of sPII, if there is such a thing, is: racial and ethnic origin, political opinions, religious, philosophical or moral beliefs, labor union membership, and information concerning health conditions or sexual habits or behavior. 

Most countries with a definition of sPII explicitly include the elements listed above or some statement in the law that anything that would cause discrimination against the person or that the government would consider to be private information. 

The European Union, in general, uses the definition above - they actually set the standard as the strongest multi-national privacy laws in the world. Some of their countries add criminal records, proceedings, and/or investigations to sPII. Switzerland goes a little further and includes social welfare programs along with government identifiers.

Argentina and the Republic of Turkey also use the definition above. Russia and Chile use most of the standard definition, but do not include trade unions.

Australia and Hungary build on the standard plus criminal definition above, but both add membership in a trade association. A trade association is like the American Medical Association, where individuals voluntarily or perhaps are required to join based on their profession. Interestingly, Hungary specifically includes "abnormal addictions" as sPII. Australia adds biometrics.

Speaking of biometrics, two other countries list that as sPII, along with the standard plus criminal elements: the Czech Republic and Azerbaijan. However, Azerbaijan goes on to include social welfare, domestic violence, taxes, marriage or family matters, and child adoption. Likewise, the Philippines take sPII to a more detailed level. In addition to the standard plus criminal definition, the Philippines add taxes, family or marriage matters, age, education, and government issued numbers.

Some of the more economically active Asian countries are strengthening their privacy laws. Commonly, these countries may not define sPII, but they do include general provisions that private data either is prohibited from being collected or deserves greater protection, without necessarily listing examples of sPII.  These nations include China, India, Indonesia, Japan, Malaysia, South Korea, Thailand, Taiwan, and Vietnam. Vietnam includes taxes and financial account information, while Japan includes financial data,  marriage and family matters, social status, and registered domicile. India includes biometrics and passwords. South Korea includes unique identifying numbers, such as passport numbers.

Although respect is a common foundation for privacy, many of the privacy protections in the Asian region are centered on this concept. An individual's personal information is expected to be respected and therefore, protected. So in many cases, sPII is simply afforded the same protection as regular PII.

A few other countries also do not necessarily define sPII, but require a judgment call on private information: Canada, Colombia, Egypt, Israel, and Mexico. Thus, everything discussed in this entry could be considered sensitive. (oh, Israel considers information about one's personality to be sPII.)

And last, keep in mind, in nearly all cases if there is something not specifically listed in the law that would be discriminatory to the individual or disclose highly personal information, you should err on the side of caution and protect that information.








Thursday, July 3, 2014

EU Approves Align Technology, Inc. as BCRs Enter Their "Golden Age."

From the IAPP

Medical device manufacturer one of just a handful to get approval as both controller and processor

June 26, 2014
By Angelique Carson, CIPP/US

With Safe Harbor constantly under fire, the binding corporate rules (BCR) process is becoming an increasingly attractive way for companies to ensure their ability to transfer data out of the European Union. This week, Align Technology, a U.S. medical device company, entered an exclusive club when its BCR application as both a data controller and a data processor was approved by EU data protection authorities.

As K Royal, CIPP/US, CIPP/E, Align’s first dedicated privacy officer, can tell you. It wasn’t an easy process, but she’s confident it’s been time and money well spent.

Despite various champions’ sweat-inducing work to keep Safe Harbor afloat, it’s becoming increasingly difficult to find days of the week that don’t feature headlines from one side of the pond or the other on its impending doom. While the U.S. Department of Commerce and regulators like the Federal Trade Commission’s Julie Brill have indeed invested time and resources in quelling Europeans’ skepticism (at best) or downright distrust (at worst) of the data transfer mechanism, the Snowden revelations’ significant impact on any trust  Europeans had in the U.S. on data protection and privacy can’t be denied by anyone who’s been paying attention.

So while EU Justice Commissioner Viviane Reding and her team conduct a review of Safe Harbor and the European Court of Justice prepares to rule on its scope, companies hoping to seal international deals aren’t taking chances. For that reason among others, BCRs are becoming an increasingly attractive alternative, as promoted recently by Eduardo Ustaran, CIPP/E, in his blog post, “Five Reasons To Do BCRs Now.”  

Align Technology brought on Royal just as the European government was setting forth its plans to update the European data protection regulation. Align had just gone through an internal privacy review and was looking to improve its privacy program. While the U.S.-EU Safe Harbor agreement was the initial plan, Align soon realized a BCR regime would establish compliance with a multitude of privacy laws in one fell swoop—COPPA, HIPAA, etc. With the ability to register as both a controller and a processor under the BCR framework established in 2012, Royal and her team were among the first to wind their way through the process.

Making the Case for BCRs at Your Company

No, it wasn’t easy, Royal admits. It took a year to negotiate the terms, and Royal had to be creative in how she would effect change at Align in order to satisfy the BCR requirements.  Plus, she was new at the company, and she had a lot to learn—from the ground up—about how Align’s processes worked.

The good news was that Royal’s case for BCRs was supported by Align’s executives and board of directors, who understood that while other data transfer mechanisms might be easier to implement, they were looking for the “right” solution, and not necessarily the easiest one.

“Privacy departments typically don’t get big budgets or lots of project time,” said Royal. “If you want a project done or you approach to change a system, privacy is not generally high on the business priority list.”

She had some help, though.

The HITECH Act was in play, for example, which applies to business associates like Align. Couple that with the Snowden revelations and a flurry of massive breach headlines within the last year or so, and Royal had a case. 

“The more bad news other people make, the better it is for those of us trying to get this done,” she said.

Bolstered by the headlines, Royal took sort of a backdoor approach to getting things done. Rather than try to dictate terms from the top down, she jumped on Align’s project team and worked with them from the start.

“Every project that went through, we used that opportunity to leverage or put in place more privacy,” she said. “We kind of built that in; we baked it into the portfolio.” For critical privacy projects, Royal says she had to prioritize projects in order to get the support she needed to get them done.

The BCR process was particularly difficult for Royal because of the company’s youth and aggressive forward march. The focus is innovation, making products better.

“We’re in the technology field, we’re in the medical device field, we’re regulated by the FDA,” she said, adding that the company acts “very much the way one imagines an innovative, technology-focused Silicon Valley company would act. The priorities are centered around the products,” and less about the policies that guide the product development.

But that’s where Royal came in.

She relied heavily on Align’s project engineers, its information security officer and the IT team. The process required weekly meetings, which was a heavy lift. Additionally, Align had previously developed a cross-functional team that serves as the Privacy Working Group.

In late 2012, Royal’s boss, the VP of litigation and regulatory affairs, flew to Europe to meet with the lead data protection regulators in person, feeling it would be a good thing to do early on.

“We said, ‘We want to do BCRs for processors,’ and they said ‘Here’s what to do,’” Royal said, adding that the in-person visit “really went far in helping us when the application came around.”

In the year between the date Align filed the BCR application and it being “closed,” multiple revisions were made to each of the policies submitted. But Royal said the lead European regulators who worked with Align—the Netherlands, as the lead authority, and the UK and Italy—took a very practical approach to the process and understood that the policies and procedures Align would promise to comply with may not be in place from the jump. It was more important to them that the wheels for such processes be in motion, rather than such processes be completely perfect.  

“For example, one policy states that we’ll train toward the BCR policies,” Royal said, but “you can’t train toward them until the policies are approved.”

The Golden Age of BCRs

Phil Lee, CIPP/E, CIPM, partner at law firm Fieldfisher, who counseled Align through the BCR application process, said BCRs are entering a “Golden Age” and for a couple of reasons. First, the Snowden revelations, after which his firm saw an “exponential uptick” in the number of applications for BCRs. Indeed, when Royal started the process for Align, she noted there were 19 companies approved for BCRs. When she’d completed the process, there were 53.

“With Safe Harbor, we’re getting clients who are making deals and having customers refuse to sign unless they do something other than Safe Harbor,” Lee said. “It doesn’t matter that Safe Harbor is still legal, they just don’t like it because they’re nervous about it.” He added that in particular, the cloud industry is reaching for BCRs.

Second, BCRs are so comprehensive, they aren’t only a data export solution, but the foundation for a global privacy program itself, capable of helping firms achieve compliance all over the world—beyond just the EU and U.S.

Want to Apply for BCRs? Take a Deep Breath

“Don’t be daunted,” Lee said. “BCRs are actually a very straight forward process to go through. The guidance is overwhelming and makes it appear far more daunting than it is.”

But the process has become increasingly streamlined as EU regulators have become more familiar with their shape. And besides, for companies who are employing responsible data protection policies, it’s more about capturing those policies in documented form.

Since Align has gained approval, Royal has been focused on doing personal training for every department at the company. Asked what advice she’d give to a company looking to go through this process themselves, Royal said privacy pros should leverage projects that are based on business needs rather than privacy alone.

Royal said BCRs had executive sponsorship and approval from the board, so when there were setbacks, she could leverage that executive approval.

“But you have to use that power sparingly and strategically,” she said. “Most projects were accomplished by finding where privacy fit within those projects based on business needs.”

Sunday, May 18, 2014

Why you should not sign everything put in front of you: HIPAA Business Associate Agreements

courtesy of backstage.com

The Health Insurance Portability and Accountability Act of 1996 and its subsequent amendments ("HIPAA") includes the contractual arrangements between Covered Entities and Business Associates, and now downstream Business Associates, or subcontractors (under the Health Information Technology for Economic and Clinical Health Act "HITECH").

This entry presumes the reader has a basic knowledge of HIPAA, but if not, please see the above link for HIPAA.

Today, we look at the evolving and complicated nature of Business Associate Agreements ("BAAs"). These are the agreements mandated by HIPAA, and now HITECH, although the recent amendments and the preamble make clear that the requirements of HIPAA and the HITECH Act apply to a Subcontractor regardless of whether the Business Associate fails to enter into a contract with the Subcontractor. This is very important below when we cover some of the complications.

First:
HIPAA requires certain provisions to be covered in BAAs. Often, the Covered Entity will put in additional provisions, usually around indemnity, audits, breach notification timelines, and data protection minimums not required by HIPAA, such as encryption.  These provisions are unduly burdensome, especially given the characteristics of most Business Associates - small operations. It is understandable why an entity would want to put these protections in place, but it may may stifle the ability to outsource and place a strain on relationships.

Second:
It is understandable why the government wants to reach further than Covered Entities and have direct oversight of Business Associates. Think about it, Dr. Jones on the neighborhood corner may not have the wherewithal to properly secure data or to respond to breaches. Or given that the new provisions provide for the State Attorneys General to bring civil actions on behalf of state residents for HIPAA violations, for damages or to enjoin further violations. I once had a privacy attorney argue with me via email (which cc'd numerous colleagues) that HIPAA as amended by HITECH absolutely did not provide for a private right of action. Well, duh - but given that the states can now do so on behalf of its citizens...it is practically the same thing. But I understand, in the law, one must be precise.

Third:
Large organizations that are now clearly defined as Business Associates, according to the guidance issued with the final rules, at first stated they would not sign BAAs. Remember above, where the new rules provide for liability whether a BAA is signed or not...?  Well, their refusal did not last long. See a discussion about Amazon Web Services here. What large providers who do not wish to be rolled under HIPAA have done, is placed administrative requirements on the Covered Entities or Business Associates which use their services, such as list all accounts for which they have patient data. Many organizations are unable to fulfill these requirements. So what is the solution - sign something they cannot fulfill or don't sign and HIPAA applies anyway. This is yet to be tested, but it is a popular conundrum.

Organizations should be careful about signing any old BAA placed in front of them. Watch your salespeople, too. They are likely presented individual BAAs when they show -  either the BAA does not apply or the employees are committing the company to a BAA without proper review. And this can be costly given the additional items that are in a BAA as discussed above.  And how can an organization signing tens or hundreds of BAAs possibly manage to push all the same provisions to downstream vendors? They conflict with each other - and Covered Entities need to understand that with the additions of clauses that are not required by HIPAA, they are setting their Business Associates up for failure.

Last, many small business owners that are Covered Entities do not understand HIPAA completely. Heck, neither do I. After a professional conference, Business Associates or potential Business Associates will be deluged with requests to sign BAAs. Sometimes, the exact same template is used, including with various clauses that include internal directions such as [choose one of the two clauses below]. It can be frustrating on all sides. Most individuals, however, are just trying to do the right thing. If a Covered Entity wants an organization to sign a BAA and the relationship does not exist, the organization can easily respond with a tight explanation. If still pushed, adding a line such as "This agreement only applies where the organization acts in the capacity of a Business Associate under HIPAA" will generally satisfy the needs of both sides. This is another untested, yet relatively popular strategy.

The conclusion here is that you should not sign everything put in front of you - or your employees. Educate all individuals to send the BAAs to a central office. Push back, or scale back, non-HIPAA provisions. It will be interesting to see how these natural conflicts play out in the next few years.