{"id":15075,"date":"2019-04-11T10:10:02","date_gmt":"2019-04-11T18:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/11\/news-8824\/"},"modified":"2019-04-11T10:10:02","modified_gmt":"2019-04-11T18:10:02","slug":"news-8824","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/11\/news-8824\/","title":{"rendered":"What is personal information? In legal terms, it depends"},"content":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Thu, 11 Apr 2019 17:03:02 +0000<\/strong><\/p>\n<p>In early March, cybersecurity professionals around the world filled the San Francisco Moscone Convention Center\u2019s sprawling exhibition halls to discuss and learn about everything infosec, from public key encryption to incident response, and from <a href=\"https:\/\/threatpost.com\/machine-learning-dark-side\/142616\/\">machine learning<\/a> to <a href=\"https:\/\/threatpost.com\/rsac-2019-for-domestic-abuse-iot-devices-pose-new-threat\/142332\/\">domestic abuse<\/a>.<\/p>\n<p>It was RSA Conference 2019, and Malwarebytes showed up to attend and present. Our Wednesday afternoon session\u2014\u201c<em>One person can change the world\u2014the story behind GDPR<\/em>\u201d\u2014<a rel=\"noreferrer noopener\" aria-label=\"explored the European Union\u2019s new, sweeping data privacy law  (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/02\/max-schrems-lawyer-regulator-international-man-of-privacy\/\" target=\"_blank\">explored the European Union\u2019s new, sweeping data privacy law <\/a>which, above all, protects \u201cpersonal data.\u201d <\/p>\n<p>But the law\u2019s broad language\u2014and finite, severe penalties\u2014left audience members with a lingering question: What exactly <em>is<\/em> personal data? <\/p>\n<p>The answer: It depends. <\/p>\n<p>Personal data, as defined by the EU\u2019s General Data Protection Regulation, is not the same as \u201cpersonally identifiable information,\u201d as defined by US data protection and cybersecurity laws, or even \u201cpersonal information\u201d as defined by California\u2019s recently-signed data privacy law. Further, in the US, data protection laws and cybersecurity laws serve separate purposes and, likewise, bestow slightly separate definitions to personal data. <\/p>\n<p>Complicating the matter is the public\u2019s instinctual approach to personal information, personal data, and online privacy. For everyday individuals, personal information can mean anything from telephone numbers to passport information to postal codes\u2014legal definitions be damned. <\/p>\n<p>Today, in the latest blog for our <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"cybersecurity and data privacy series (opens in a new tab)\">cybersecurity and data privacy series<\/a>, we discuss the myriad conditions and legal regimes that combine to form a broad understanding of personal information.<\/p>\n<p>Companies should not overthink this. Instead, data privacy lawyers said businesses should pay attention to what information they collect and where they operate to best understand personal data protection and compliance. <\/p>\n<p>As Duane Morris LLP intellectual property and cyber law partner Michelle Donovan said: <\/p>\n<p>\u201cWhat it comes down to, is, it doesn\u2019t matter what the rules are in China if you\u2019re not doing business in China. Companies need to figure out what jurisdictions apply, what information are they collecting, where do their data subjects reside, and based on that, figure out what law applies.\u201d <\/p>\n<h3><strong>What law applies? <\/strong><\/h3>\n<p>The personal information that companies need to protect changes from law to law. However, even though global data protection laws define personal information in diverse ways, the definitions themselves are not important to every business. <\/p>\n<p>For instance, a small company in California that has no physical presence in the European Union and makes no concerted efforts to market to EU residents does not have to worry about GDPR. Similarly, a Japanese startup that does not collect any Californians\u2019 data does not need to worry about that state&#8217;s recently-signed data privacy law. And any company outside the US that does not collect any US personal data should not have to endure the headaches of complying with 50 individual state data breach notification laws. <\/p>\n<p>Baker &amp; McKenzie LLP of counsel Vincent Schroeder, who advises companies on privacy, data protection, information technology, and e-commerce law, said that the various rules that determine which laws apply to which businesses can be broken down into three basic categories: territorial rules, personal rules, and substantive rules. <\/p>\n<p>Territorial rules are simple\u2014they determine legal compliance based on a company\u2019s presence in a country, state, or region. For instance, GDPR applies to companies that physically operate in any of the EU\u2019s 28 member-states, along with companies that directly market and offer their products to EU citizens. That second rule of direct marketing is similar to another data privacy law in Japan, which applies to any company that specifically offers its products to Japanese residents. <\/p>\n<p>\u201cThat\u2019s the \u2018marketplace rule,\u2019 they call it,\u201d Schroeder said. \u201cIf you\u2019re doing business in that market, consciously, then you\u2019re affecting the rights of the individuals there, so you need to adhere to the local regulatory law.\u201d&nbsp;<\/p>\n<p>Substantive rules, on the other hand, determine compliance based on a company\u2019s characteristics. For example, the newly-passed California Consumer Privacy Act applies to companies that meet any single one of the following three criteria: pull in annual revenue of $25 million, derive 50 percent or more of that annual revenue from selling consumers\u2019 personal information, or buy, receive, sell, or share the personal information of 50,000 or more consumers, households, or devices. <\/p>\n<p>Businesses that want to know what personal information to legally protect should look first to which laws apply. Only then should they move forward, because \u201cpersonal information\u201d is never just one thing, Schroeder said. <\/p>\n<p>\u201cIt\u2019s an interplay of different definitions of the&nbsp;territorial, personal, and substantive scopes&nbsp;of application, and for definitions of personal data,\u201d Schroeder said.<\/p>\n<h3><strong>Personal information\u2014what\u2019s included?<\/strong><\/h3>\n<p>The meaning of personal information changes depending on who you ask and which law you read. Below, we focus on five important interpretations. What does personal information mean to the public? What does it mean according to GDPR? And what does it mean according to three state laws in California\u2014the country\u2019s legislative vanguard in protecting its residents\u2019 online privacy and personal data. <\/p>\n<h4><strong>The public<\/strong><\/h4>\n<p>Let\u2019s be clear: Any business concerned with legal obligations to protect personal information should not start a compliance journey by, say, running an employee survey on Slack and getting personal opinions. <\/p>\n<p> That said, public opinions on personal data are important, as they can <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/03\/what-congress-means-when-it-talks-about-data-privacy-legislation\/\">influence lawmakers into drafting new legislation<\/a> to better protect online privacy. <\/p>\n<p>Jovi Umawing, senior content writer for Malwarebytes Labs who recently compiled <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/labs-survey-finds-privacy-concerns-distrust-of-social-media-rampant-with-all-age-groups\/\">nearly 4,000 respondents\u2019 opinions on online privacy<\/a>, said that personal information is anything that can define one person from another. <\/p>\n<p>\u201cPersonal&nbsp;information&nbsp;for me is relevant data about a person that makes them unique or stand out,\u201d Umawing wrote. \u201cIt&#8217;s something intangible that one owns or possesses that (when combined with other&nbsp;information) points back to the person with very high or unquestionable accuracy.\u201d<\/p>\n<p>Pieter Arntz, malware intelligence researcher for Malwarebytes, provided a similar view. He said he considers \u201ceverything that can be used to identify me or find more specific&nbsp;information about me as&nbsp;personal&nbsp;information.\u201d That includes addresses, phone numbers, Social Security numbers, driver\u2019s license info, passport info, and, \u201calso things like the postal code,\u201d which, for people who live in very small cities, can be revealing, Arntz said.<\/p>\n<p>Interestingly, some of these definitions overlap with some of the most popular data privacy laws today. <\/p>\n<h4><strong>GDPR<\/strong><\/h4>\n<p>In 2018, the General Data Protection Regulation took effect, granting EU citizens new rights to access, transport, and delete personal data. In 2019, companies are still figuring out what that personal data encompasses. <\/p>\n<p>The <a href=\"https:\/\/gdpr-info.eu\/issues\/personal-data\/\">text of the law<\/a> offers little clarity, instead providing this ocean-wide ideology: \u201cPersonal data should be as broadly interpreted as possible.\u201d<\/p>\n<p>According to GDPR, the personal data that companies must protect includes any information that can \u201cdirectly or indirectly\u201d identify a person\u2014or subject\u2014to whom the data belongs or describes. Included are names, identification numbers, location data, online identifiers like screen names or account names, and even characteristics that describe the \u201cphysical, physiological, genetic, mental, commercial, cultural, or social identity of a person.\u201d <\/p>\n<p>That last piece could include things like an employee\u2019s performance record, a patient\u2019s medical diagnosis history, a user\u2019s specific anarcho-libertarian political views, and even a person\u2019s hair color and length, if it is enough to determine that person\u2019s identity. <\/p>\n<p>Donovan, the attorney from Duane Morris, said that GDPR\u2019s definition could include just about any piece of information about a person that is not anonymized. <\/p>\n<p>\u201cEven if that information is not identifying [a person] by name, if it identifies by a number, and that number is known to be used to identify that person\u2014either alone or in combination\u2014it could still associate with that person,\u201d Donovan said. \u201cYou should assume that if you have any data about an individual that is not anonymized when you get it, it\u2019s likely going to be covered.\u201d  <\/p>\n<h4><strong>The California Consumer Privacy Act<\/strong><\/h4>\n<p>In June 2018, California became the first state in the nation to respond to frequent online privacy crises by <a href=\"https:\/\/www.wired.com\/story\/california-unanimously-passes-historic-privacy-bill\/\">passing a comprehensive, statewide data privacy law<\/a>. The California Consumer Privacy Act, or CCPA, places new rules on companies that collect California residents\u2019 personal data. <\/p>\n<p>The law, which will go into effect in 2020, calls this type of data \u201cpersonal information.\u201d <\/p>\n<p>\u201cPersonal information,\u201d according to the <a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">CCPA<\/a>, is \u201cinformation that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.\u201d <\/p>\n<p>What that includes in practice, however, is a broad array of data points, including a person\u2019s real name, postal address, and online IP address, along with biometric information\u2014like DNA and fingerprint data\u2014and even their browsing history, education history, and what the law vaguely describes as \u201caudio, electronic, visual, thermal, olfactory, or similar information.\u201d <\/p>\n<p>Aside from protecting several new data types, the CCPA also makes a major change to how Californians can assert their data privacy rights in court. For the first time ever, a statewide data privacy law details \u201cstatutory damages,\u201d which are legislatively-set, monetary amounts that an individual can ask to recover when filing a private lawsuit against a company for allegedly violating the law. Under the CCPA, people who believe their data privacy rights were violated can sue a company and ask for up to $750. <\/p>\n<p>This is a huge shift in data privacy law, Donovan said. <\/p>\n<p>\u201cFor the first time, there\u2019s a real privacy law with teeth,\u201d Donovan said. <\/p>\n<p>Previously, if individuals wanted to sue a company for a data breach, they needed to prove some type of economic loss when asking for monetary damages. If, say, a fraudulent credit card was created with stolen data, and then fraudulent charges were made on that card, monetary damages might be easy to figure out. But it\u2019s rarely that simple. &nbsp;<\/p>\n<p>\u201cNow, regardless of the monetary damage, you can get this statutory damage of $750 per incident,\u201d Donovan said. <\/p>\n<h4><strong>California\u2019s data breach notification law and data protection law<\/strong><\/h4>\n<p>If we stay in California but go back in time several years, we see the start of a trend\u2014<a href=\"https:\/\/iapp.org\/news\/a\/california-continues-to-shape-privacy-and-data-security-standards\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">California has been the first state, more than once, to pass data protection legislation<\/a>. <\/p>\n<p>In 2002, California passed its <a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=CIV&amp;sectionNum=1798.82\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">data breach notification law<\/a>. The first of its kind in the United States, the law forced companies to notify California residents about unauthorized access to their \u201cpersonal information.\u201d <\/p>\n<p>The previous definitions of personal information and data that we\u2019ve covered\u2014GDPR\u2019s broad, anything-goes approach, and CCPA\u2019s inclusion of heretofore unimagined \u201colfactory,\u201d smell-based personal data\u2014do not apply here. <\/p>\n<p>Instead, personal information in the 17-year-old law\u2014which received an update five years ago\u2014is defined as a <em>combination<\/em> of types of information. The necessary components include a Californian\u2019s first and last name, or first initial and last name, paired up with things like their Social Security number, driver\u2019s license number, and credit card number and corresponding security code, along with an individual\u2019s email address and password. <\/p>\n<p>So, if a company suffers a data breach of a California resident\u2019s first and last name <em>plus<\/em> their Social Security number? That\u2019s considered personal information. If a data breach compromises another California resident\u2019s first initial, last name, and past medical insurance claims? Once again, that data is considered personal information, according to the law. <\/p>\n<p>In 2014, this definition carried somewhat over into California\u2019s data protection law. That year, then-California governor Jerry Brown <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.whitecase.com\/publications\/article\/california-passes-new-data-protection-laws-effective-january-1-2015\" target=\"_blank\">signed changes<\/a> to the state\u2019s <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=CIV&amp;sectionNum=1798.81.5\" target=\"_blank\">civil co<\/a><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=CIV&amp;sectionNum=1798.81.5\" target=\"_blank\">de<\/a> that created data protection requirements for any company that owns, licenses, or maintains the \u201cpersonal information\u201d of California residents. <\/p>\n<p>According to Assembly Bill No. 1710, \u201cpersonal information\u201d is, once again, the combination of information that includes a first name and last name (or first initial and last name), plus a Social Security number, driver\u2019s license number, credit card number and corresponding security number, and medical information and health information. <\/p>\n<p>The definitions are not identical, though. California\u2019s data protection law, unlike its data breach notification law, does not cover data collected by automated license plate readers, or ALPRs. ALPRs can indiscriminately\u2014<a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/01\/what-we-learned-oakland-raw-alpr-data\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">and sometimes disproportionately<\/a>\u2014capture the license plate numbers of any vehicles that cross into their field of vision. <\/p>\n<p>Roughly one year later, California passed a law to strengthen protections of ALPR-collected data. <\/p>\n<h3><strong>The takeaway<\/strong><\/h3>\n<p>By now, it\u2019s probably easier to define what personal information isn\u2019t rather than what it is (obviously, there is a legal answer to that, too, but we\u2019ll spare the details). These evolving definitions point to a changing legal landscape, where data is not protected solely because of its type, but because of its inherent importance to people\u2019s privacy. <\/p>\n<p>Just as there is no one-size-fits-all definition to personal information, there is no one-size-fits-all to personal data protection compliance. If a company finds itself wondering what personal data it should protect, may we suggest something we have done for every blog in this series: Ask a lawyer. <\/p>\n<p>Join us again soon for the next blog in our series, in which we will discuss consumer protections for data breaches and online privacy invasions. &nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\">What is personal information? In legal terms, it depends<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Thu, 11 Apr 2019 17:03:02 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/' title='What is personal information? In legal terms, it depends'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_1062285074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>What exactly is the &#8220;personal information&#8221; that companies need to legally protect? Learn which data points organizations need to secure, from Social Security numbers to olfactory, smell-based data (!), to comply with the law.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/privacy-security-world\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/california-consumer-privacy-act\/\" rel=\"tag\">California Consumer Privacy Act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-law\/\" rel=\"tag\">cybersecurity law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach-notification\/\" rel=\"tag\">data breach notification<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach-notification-law\/\" rel=\"tag\">data breach notification law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-legislation\/\" rel=\"tag\">data privacy legislation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-protection-law\/\" rel=\"tag\">data protection law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/european-union\/\" rel=\"tag\">European Union<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gdpr\/\" rel=\"tag\">gdpr<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/general-data-protection-regulation\/\" rel=\"tag\">General Data Protection Regulation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-privacy\/\" rel=\"tag\">online privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personal-data\/\" rel=\"tag\">personal data<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personal-information\/\" rel=\"tag\">personal information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personally-identifiable-information\/\" rel=\"tag\">personally identifiable information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rsa-conference\/\" rel=\"tag\">RSA Conference<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/' title='What is personal information? In legal terms, it depends'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\">What is personal information? In legal terms, it depends<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21011,18466,21175,21176,21401,21536,3037,12116,12210,10470,14563,17588,19130,5897,11391,10497],"class_list":["post-15075","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-california-consumer-privacy-act","tag-cybersecurity-law","tag-data-breach-notification","tag-data-breach-notification-law","tag-data-privacy-legislation","tag-data-protection-law","tag-european-union","tag-gdpr","tag-general-data-protection-regulation","tag-online-privacy","tag-personal-data","tag-personal-information","tag-personally-identifiable-information","tag-privacy","tag-rsa-conference","tag-security-world"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15075"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15075\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15075"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}