{"id":15247,"date":"2019-05-03T08:10:02","date_gmt":"2019-05-03T16:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/03\/news-8996\/"},"modified":"2019-05-03T08:10:02","modified_gmt":"2019-05-03T16:10:02","slug":"news-8996","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/05\/03\/news-8996\/","title":{"rendered":"The top six takeaways for corporate data privacy compliance"},"content":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Fri, 03 May 2019 15:00:00 +0000<\/strong><\/p>\n<p>For nearly two months, Malwarebytes Labs has led readers on a journey through data privacy laws around the world, exploring the nuances between \u201c<a rel=\"noreferrer noopener\" aria-label=\"personal information (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\" target=\"_blank\">personal information<\/a>\u201d and \u201cpersonal data,\u201d as well as <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"_blank\">between data breach notification laws in Florida, Utah, California, and Iowa<\/a>. <\/p>\n<p>We explored the risks of jumping into the global data privacy game, comparing the <a rel=\"noreferrer noopener\" aria-label=\"European Union\u2019s laws (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/04\/globetrotting-businesses-beware-data-privacy-abroad-question-risk\/\" target=\"_blank\">European Union\u2019s laws<\/a> with the laws in China, South Korea, and Japan. And we also <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/03\/what-congress-means-when-it-talks-about-data-privacy-legislation\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"examined current legislative proposals (opens in a new tab)\">examined current legislative proposals<\/a> in the United States to better protect Americans\u2019 data. <\/p>\n<p>But all that information was delivered across five separate blogs of more than 10,000 collective words. Look, we get it\u2014it\u2019s a lot to read through. So, we\u2019re offering some help. <\/p>\n<p>Before fully closing out our data privacy and cybersecurity law series, we are providing the top six takeaways for corporate data privacy compliance. From emerging startups to burgeoning enterprises, these rules should help businesses not just with legal liability, but also to better understand\u2014and gain\u2014user trust. <\/p>\n<p>Here we go. <\/p>\n<h3>1. Write and post a privacy policy<\/h3>\n<p>In 2004, California changed the online privacy landscape for companies everywhere. The Golden State\u2014which would soon become a pioneer in data privacy law\u2014passed the <a href=\"https:\/\/consumercal.org\/about-cfc\/cfc-education-foundation\/california-online-privacy-protection-act-caloppa-3\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">California Online Privacy Protection Act<\/a>. <\/p>\n<p>The law is simple. Any company, organization, or entity that runs a website which also collects the personally identifiable information of California residents must also post a privacy policy on their site. <\/p>\n<p>The privacy policy must explain the types of information collected from users, the types of information that may be shared with third parties, the effective date of the privacy policy, and the process\u2014if any\u2014for a user to review and request changes to their collected information. <\/p>\n<p>Because the law applies to any website that collects Californians\u2019 information, it applies far beyond the state\u2019s geographic borders. This isn\u2019t just for California-based companies like Apple, Google, Twitter, and LinkedIn. It&#8217;s also for Washington-based Microsoft, New York-based Verizon, and Texas-based Dell. <\/p>\n<p>Also, the law requires that every privacy policy be easy to find. Even Big Tech doesn\u2019t challenge this requirement: In 2007, <a href=\"https:\/\/bits.blogs.nytimes.com\/2008\/05\/30\/is-google-violating-a-california-privacy-law\/?ref=technology\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">after reporting by the New York Times<\/a>, Google decided to more prominently display its privacy policy on its website. <\/p>\n<h3>2. Do not lie in your privacy policy<\/h3>\n<p>This should be obvious, but in case it is not: Do not lie to your users about what you do with their data. You can collect their data, store their data, share their data, even sell their data, so long as you tell them the truth. <\/p>\n<p>Any company that lies about its data protection practices could be hit with a lawsuit from a state Attorney General or, pending some legal hoops to jump through, an individual user. That\u2019s because, in the US, data protection rights can still be asserted under an area of the law that prohibits \u201cunlawful, unfair, or fraudulent\u201d business practices, along with \u201cunfair, deceptive, untrue, or misleading\u201d advertising. <\/p>\n<p>Lee Tien, senior staff attorney at Electronic Frontier Foundation, explained this area of consumer privacy law. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cMost of consumer privacy that\u2019s not already controlled by a statute lives in this space of \u2018Oh, you made a promise about privacy, and then you broke it,\u2019\u201d Tien said. \u201cMaybe you said you don\u2019t share information, or you said that when you store information at rest, you store it in air-gapped computers, using encryption. If you say something like that, but it\u2019s not true, you can get into trouble.\u201d<\/p>\n<\/blockquote>\n<p>These lawsuits have been successfully filed against companies before. Last year, Uber agreed to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.npr.org\/2018\/09\/27\/652119109\/uber-pays-148-million-over-year-long-cover-up-of-data-breach\" target=\"_blank\">pay $148 million to settle a lawsuit<\/a> alleging the company\u2019s misconduct when covering up a 2016 data breach. The lawsuit was brought by every single state Attorney General in the United States, plus the Attorney General for Washington, DC. <\/p>\n<h3>3. If you want to expand beyond the US market, consult a data privacy lawyer first<\/h3>\n<p>Data privacy and cybersecurity laws abroad are not like the laws in the US. <\/p>\n<p>For example, the European Union recently bestowed upon its citizens the new rights to <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/02\/max-schrems-lawyer-regulator-international-man-of-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">access, control, transport, and delete information that companies collect on them<\/a>. China\u2019s cybersecurity law grants its government the right to inspect and even copy the source code of incoming software products. South Korea\u2019s cybersecurity laws include fierce penalties and even possible jail time. Singapore, often viewed as a friendly country for US expansion, has its own cybersecurity law that protects \u201cessential\u201d services, a definition that does not exist here in the US. <\/p>\n<p>Expanding into a new country is, most of all, a question of risk: <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/04\/globetrotting-businesses-beware-data-privacy-abroad-question-risk\/\" target=\"_blank\">Can you afford\u2014quite literally\u2014the cost of compliance?<\/a>\u00a0<\/p>\n<h3>4. Personal information is not the same as personal data<\/h3>\n<p>The terms \u201cpersonal information,\u201d \u201cpersonal data,\u201d and \u201cpersonally identifiable information\u201d get thrown around a lot, sometimes even interchangeably, but <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\" target=\"_blank\">these terms have specific legal definitions that do not carry over so easily from one to another<\/a>. The definitions for the terms do vary, however, depending on which law in which state or country you consult.<\/p>\n<p>The important thing to remember is that these terms describe types of information that companies are legally required to protect. Protecting one law\u2019s definition of \u201cpersonal information\u201d is not the same as protecting another law\u2019s definition of \u201cpersonal data,\u201d and mixing the two up could lead to compliance mishaps. <\/p>\n<p>The best advice is to, once again, consult a data privacy lawyer. Getting lost in an array of country-specific, legal rabbit holes does not help anyone. <\/p>\n<p>Michelle Donovan, intellectual property and cyber law partner at Duane Morris LLP put it clearly: <\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cWhat it comes down to, is, it doesn\u2019t matter what the rules are in China if you\u2019re not doing business in China. Companies need to figure out what jurisdictions apply, what information are they collecting, where do their data subjects reside, and based on that, figure out what law applies.\u201d<\/p>\n<\/blockquote>\n<h3>5. Get ready for comprehensive data privacy legislation in the US<\/h3>\n<p>In the past year, at least <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/03\/what-congress-means-when-it-talks-about-data-privacy-legislation\/\" target=\"_blank\">four US Senators have proposed comprehensive, federal data privacy legislation<\/a>. Each bill seeks to improve Americans\u2019 online privacy. <\/p>\n<p>Sen. Ron Wyden\u2019s bill, for example, proposes that dishonest tech executives face potential jail time. Sen. Amy Klobuchar\u2019s bill, on the other hand, focuses on making corporate privacy policies clear and understandable. Sen. Marco Rubio\u2019s bill would ask the country\u2019s trade enforcement agency, the Federal Trade Commission (FCC), to propose its own rules on data privacy, which Congress would later vote on. And Sen. Brian Schatz\u2019s bill would place a new \u201cduty to care\u201d requirement on companies handling user data. <\/p>\n<p>None of the above-mentioned bills have received a vote in Congress, but this area could move fast, and many assume that data privacy will become a lynchpin issue in the 2020 presidential election.<\/p>\n<h3>6. Respect and protect your users\u2019 data<\/h3>\n<p>Your users have <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/consumers-have-few-legal-options-for-protecting-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">few legal options in asserting their data privacy rights<\/a>. Despite this, your company should take it upon itself to treat user privacy with respect. <\/p>\n<p>You will not be alone in this proactive decision. Apple, <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/05\/mozilla-urges-apple-to-make-privacy-a-team-sport\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Mozilla (opens in a new tab)\">Mozilla<\/a>, Signal, WhatsApp, CREDO Mobile, ProtonMail, Helix DNA, and several other companies already understand that meaningful user privacy can serve as a competitive advantage.<\/p>\n<p>As Malwarebytes Labs showed this year, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/labs-survey-finds-privacy-concerns-distrust-of-social-media-rampant-with-all-age-groups\/\" target=\"_blank\">people care immensely about online privacy<\/a>. Listening to your users should not be a matter of legal compliance, but a matter of respect. <\/p>\n<p>Join us next week for another set of data privacy takeaways, this time for consumers in the US.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/05\/the-top-six-takeaways-for-corporate-data-privacy-compliance\/\">The top six takeaways for corporate data privacy compliance<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/05\/the-top-six-takeaways-for-corporate-data-privacy-compliance\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Fri, 03 May 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/05\/the-top-six-takeaways-for-corporate-data-privacy-compliance\/' title='The top six takeaways for corporate data privacy compliance'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/shutterstock_1048402207.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Here are Labs&#8217; top six takeaways from our data privacy and cybersecurity law series on corporate data privacy compliance. From emerging startups to burgeoning enterprises, these rules help not just with legal liability, but also user trust. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/privacy-security-world\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/california-online-privacy-protection-act\/\" rel=\"tag\">California Online Privacy Protection Act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-law\/\" rel=\"tag\">cybersecurity law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-laws\/\" rel=\"tag\">cybersecurity laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach-notification\/\" rel=\"tag\">data breach notification<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach-notification-law\/\" rel=\"tag\">data breach notification law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy\/\" rel=\"tag\">Data privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-compliance\/\" rel=\"tag\">data privacy compliance<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-law\/\" rel=\"tag\">data privacy law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-laws\/\" rel=\"tag\">data privacy laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-legislation\/\" rel=\"tag\">data privacy legislation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gdpr\/\" rel=\"tag\">gdpr<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/general-data-protection-regulation\/\" rel=\"tag\">General Data Protection Regulation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/helix-dna\/\" rel=\"tag\">Helix DNA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mozilla\/\" rel=\"tag\">mozilla<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-privacy\/\" rel=\"tag\">online privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personal-data\/\" rel=\"tag\">personal data<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personal-information\/\" rel=\"tag\">personal information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personally-identifiable-information\/\" rel=\"tag\">personally identifiable information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy-policy\/\" rel=\"tag\">privacy policy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/protonmail\/\" rel=\"tag\">protonmail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/signal\/\" rel=\"tag\">signal<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/uber\/\" rel=\"tag\">Uber<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/user-privacy\/\" rel=\"tag\">user privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/whatsapp\/\" rel=\"tag\">whatsapp<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/05\/the-top-six-takeaways-for-corporate-data-privacy-compliance\/' title='The top six takeaways for corporate data privacy compliance'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/05\/the-top-six-takeaways-for-corporate-data-privacy-compliance\/\">The top six takeaways for corporate data privacy compliance<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,21170,18466,21174,21175,21176,11063,21177,21400,21178,21401,12116,12210,21634,13271,10470,14563,17588,19130,5897,18883,13761,10497,3205,3011,21730,10440],"class_list":["post-15247","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-california-online-privacy-protection-act","tag-cybersecurity-law","tag-cybersecurity-laws","tag-data-breach-notification","tag-data-breach-notification-law","tag-data-privacy","tag-data-privacy-compliance","tag-data-privacy-law","tag-data-privacy-laws","tag-data-privacy-legislation","tag-gdpr","tag-general-data-protection-regulation","tag-helix-dna","tag-mozilla","tag-online-privacy","tag-personal-data","tag-personal-information","tag-personally-identifiable-information","tag-privacy","tag-privacy-policy","tag-protonmail","tag-security-world","tag-signal","tag-uber","tag-user-privacy","tag-whatsapp"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15247"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15247\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}