Protecting Personal Privacy in the Global Business Environment

GlobalOutlook
Protecting Personal Privacy in the
Global Business Environment
In the electronic world, protecting personally identifiable information is a critical challenge
for all companies and governments.
David O. Stephens, CRM, FAI, CMC
Editor’s Note: The following is an
excerpt from David O. Stephens’ Records
Management: Making the Transition
from Paper to Electronic, published earlier this year by ARMA International.
with impunity. In countries where no
laws to protect personal data exist, sensitive data relating to individuals can be
sold to other parties without their consent, or it may be exposed to the risks of
identity theft.
The European Union (EU) has
adopted strict rules, with mechanisms
for global enforcement, to mitigate
these risks. Europe has the world’s most
stringent set of rules governing how
companies and governments must
manage personal data such as age, marital status, buying patterns, and similar
information. In Europe, privacy is generally viewed as a basic human right,
enforceable by stringent legal protections, and the Europeans have become
global leaders in setting the standards
for privacy and attempting to promote
B
ecause records of individual
customers or potential customers often have high market value, personally identifiable information has been
described as the world’s new
currency. With the global reach of the
Internet, which makes sending personal
data from one continent to another nearly instantaneous, privacy is an issue of
high international concern. Via the
Internet, a company located in one country with one set of privacy rules can send
personal data about an individual, or a
database containing millions of individual records, to another country with a
different set of privacy rules.
This situation is particularly worrisome because of the globalization of
business operations. When companies
export their business operations abroad,
they may also send sensitive customer
data overseas. Once sent abroad, the
company may be at liberty to market or
otherwise disseminate the personal data
56
The Information Management Journal
At the Core
This article
Describes privacy legislation in the
U.S, Canada, and the EU
Explains the U.S. “Safe Harbor”
Agreement
Provides guidelines for protecting
personal data
•
M a y / J u n e 2 0 07
them throughout the world.
In the United States (with the singular exception of California), such protections are considerably less stringent,
as business interests have generally
opposed any legislation or regulations
that restrict their ability to collect and
use or even sell or exchange personal
information at their discretion, without
government interference.
The EU’s privacy laws require retailers to obtain permission to collect data,
trade it to partners, sell it, or even use it
for their own marketing – all common
practices in the United States. European
companies are required to grant individuals open access to records and data
about them and correct any inaccuracies. The EU restricts how much information companies can collect on customers and employees and how long
they are permitted to retain it. Video
surveillance tapes, for example, must be
erased after a short period of retention.
With its high global standard of
tight restrictions on personal data, the
EU has been quite successful in influencing the adoption of privacy laws
throughout the world. EU-inspired privacy laws are now the norm in Canada,
Australia, New Zealand, and parts of
Asia and Latin America. The EU influence is also being felt in the United
States.
• Relevant and not excessive for the
purpose collected
The EU’s Data Protection
Directive
• Kept in a form that permits identification of data subjects for no longer
than necessary
In 1998, the EU issued its Directive
on Data Protection (95/46/EC). The
directive was devised because some EU
member states did not have privacy protection for individual citizens, while
other countries had incompatible laws.
To address this problem, the EU’s parliament issued its directive on data protection, which was intended to harmonize European privacy laws and afford a
continent-wide standard of protection
for all European citizens.
The directive’s most significant feature is that “data subjects” – persons
from or about whom data is collected –
must unambiguously grant their consent before such data is collected, after
having been informed about the purpose(s) for which the data will be used.
The directive applies to the collection,
transmission, and processing of personal data, which is defined as “any information relating to an identified or identifiable natural person” residing within
a member state of the EU. The directive
applies to data that directly or indirectly identifies an individual, which
includes a person’s name, as well as
other personal data about the person,
such as address, telephone number, or
other information of a personal nature.
However, the directive expressly forbids
the collection of personal information
that could be characterized as sensitive,
which is defined as a person’s racial or
ethnic origin, political opinions, religious beliefs, or sexual preferences.
The directive consists of regulations
relating to the collecting, processing,
and handling of personal data maintained within the EU, as well as personal data transferred from the EU to other
countries. The directive requires that
personal data be managed such that it is
• Collected for specified and legitimate
purposes and not processed further
types of businesses. For example:
• Accurate and updated as necessary
[European Union] EUinspired privacy laws
are now the norm in
Canada, Australia, New
Zealand, and parts of
Asia and Latin
America. The EU
influence is also being
felt in the
United States.
Privacy in the United States
In sharp contrast to the situation in
Europe, the United States does not have a
comprehensive privacy law and, generally, has promoted industry self-regulation
rather than legislation as the best means
of balancing privacy interests against the
demands of electronic commerce.
The Privacy Act of 1974 protects personal information about U.S. citizens
captured in records maintained by agencies of the federal government, but the
law has no applicability outside the federal sector. However, specific laws and regulations do apply to personal records and
information – such as credit history and
other financial records, telephone
records, educational records, and patient
medical records – maintained by certain
M a y / J u n e 2 0 07
• Health Information – The Health
Insurance Portability and Accountability Act of 1996 (HIPAA) and the
Privacy Rule of 2001 impose privacy
restrictions applicable to health
information, typically in the form of
patient-specific medical records.
Regulations promulgated under the
Act and Privacy Rule require regulated parties (i.e., health plans, healthcare clearinghouses, and certain
healthcare providers) to implement a
variety of privacy measures for
patients, insured parties, or other
individuals subject to protection
under the rules. These include rules
governing access to patient medical
records, requirements for patient
consent to permit the sharing or disclosure of such records, patient
recourse for privacy violations, and
other restrictions.
• Financial Information – The GrammLeach-Bliley Act of 1999 requires
financial services companies to
establish privacy policies and governs how customer financial data
can be shared within and between
institutions. Title V of the Act contains provisions pertaining to the
privacy of customer-specific financial records by banks and other
financial institutions. As of July
2001, financial institutions are
required to provide notice and an
opportunity for customers to opt
out of disclosures of nonpublic personal information to nonaffiliated
third parties.
The U.S. Safe Harbor Agreement
One of the main features of the EU
privacy directive is that it is designed to
ensure that corporations, including U.S.
multinational companies doing business
in Europe, do not circumvent the EU’s
data protection requirements by exporting personal data to countries that are
not subject to the EU’s privacy rules. The
directive prohibits data transfers to nonEU countries, including the United
•
The Information Management Journal
57
GlobalOutlook
States, unless those countries provide
adequate protection for the data.
Through this mechanism, Europe is
attempting to make its data protection
rules the enforceable global standard
for privacy. At the time of this writing,
the U.S. has not been deemed to provide adequate protection of personal
data. During the past several years,
negotiations have been continuous,
often contentious, between Europe and
the United States to seek an acceptable
compromise. To date, this has taken the
form of “safe harbor” data protections.
The U.S. Department of Commerce,
in consultation with the European
Commission, developed the Safe Harbor
Agreement by which U.S. companies can
avoid sanctions imposed by the EU if
they voluntarily embrace a somewhat less
stringent version of the EU privacy directive. Under the agreement, before personal data about European citizens may
be transferred to the United States,
American companies must promise to
handle data about EU citizens in accordance with the EU’s standards while the
data is maintained in the United States.
However, detailed provisions, including
enforcement, have yet to be worked out
between the United States and the EU.
Guidelines for RIM
Privacy Compliance
• Organizations should prepare a privacy policy of enterprise-wide
coverage that places appropriate restrictions on the collection,
use, dissemination and disclosure, and retention of personal
information.
- Such policies should state categorically that no unauthorized
use will be made of the information that conflicts with the
policy in any way.
- Breach of the organization’s privacy policies should be a disciplinary offense.
- Deliberate breaches should be considered gross misconduct,
with appropriate remedies.
• Organizations maintaining personal data should consider encryption as one means of enhancing the security of the data.
- Encrypt records containing names, Social Security numbers,
credit card numbers, and other personal data whenever possible to reduce the risk of breaches.
• All recordkeeping systems containing personal information should
be systematically audited to determine the adequacy of the management controls.
- All records eligible for disposal should be properly destroyed.
California: Leading the U.S. in
Privacy
• RIM staff should determine exactly how many recordkeeping
systems that contain personal data on individuals are maintained,
where those files are kept, what they contain, and how the
information is used, distributed, and disclosed.
In the United States, the State of
California has positioned itself at the
forefront of the privacy movement. On
July 1, 2004, the first online privacy law
ever enacted in the United States –
California’s Online Privacy and
Disclosure Act of 2003 – went into
effect. The new law requires all commercial entities operating in the state
that collect personal information online
to clearly post a privacy policy to
inform citizens concerning the collection and use of data about them. In
recent years, California has enacted a
plethora of new privacy laws. In brief,
these laws:
- Conduct a comprehensive and detailed inventory of all
records and files containing information concerning individual
employees, customers, or other persons.
• Records managers should carefully reexamine their records
retention practices.
- Retain only factual data concerning individuals and retain all
such records for the minimum periods of time required to
meet business needs and comply with the law.
- Destroy all other records – particularly those containing opinions about individuals – under an approved records retention
policy.
• Require businesses to inform customers when personal data is shared
58
The Information Management Journal
•
M a y / J u n e 2 0 07
with other parties
• Require businesses to notify customers
when their personal data has been
exposed to a security breach
• Restrict the use of Social Security
numbers as a means of identification
• Prohibit unsolicited advertising by
means of fax and e-mail
• Prohibit the sending of text messaging advertising to cell phones and
pagers
• Require financial institutions to
obtain permission before sharing
personal information with nonaffiliated companies or parties
• Prohibit businesses from obtaining
medical information about individuals for marketing purposes without their consent
These California legislative initiatives are expected to be the benchmark
for consideration of privacy initiatives
by other U.S. states in the coming years.
Canada’s Privacy Law
Elsewhere in North America, privacy in Canada is much more in line with
the European model than is the case in
the United States. According to a recent
study, Canadian businesses tend to view
privacy practices positively – as an
opportunity to improve relations with
customers – while U.S. firms see privacy
measures more in the context of burdensome government compliance.
Canada’s privacy law is much more
similar to the EU data protection model
than anything in the United States.
Canada’s federal privacy law (the
Personal Information Protection and
Electronic Documents Act), which
became fully effective in 2004, extends
privacy protection to all personal data
collected by companies on Canadian
citizens, regardless of when the data was
collected. Companies doing business in
Canada must now review how they
handle personal data previously collect-
ulations, and directives. Organizations
subject to privacy or data protection
issues will have to implement carefully
considered RIM initiatives to comply
with global standards and to minimize
their legal liabilities at the same time.
Recommendations for RIM compliance
with privacy laws are presented on page
58.
Records managers should work
with their organization’s chief privacy
officer, or with other managers having
responsibility for information protection and security, to ascertain the privacy status of the organization and how to
comply with whatever requirements are
applicable to it.
ed. The law applies to all commercial
activities in Canada, as defined in the
trade and commerce section of the
Canadian constitution. The law
requires that personal information be
used only for identified purposes, that
disclosure be limited except where prior
consent is obtained, and that data must
be properly destroyed when no longer
needed.
RIM Implications
Records and information management (RIM) professionals can and
should play a key role in organizational
privacy initiatives because privacy protection requires that organizations
adopt recordkeeping practices consistent with information protection and
disclosure policies, as well as relevant
national and international statutes, reg-
Records Management: Making the Transition from Paper to Electronic is available
for purchase at www.arma.org/bookstore.
David O. Stephens, CRM, FAI, CMC, is Director of the Records Management
Consulting Division at Zasio Enterprises Inc., a records management software and consulting firm based in Boise, Idaho, where he directs records and information consulting
studies and projects for clients in government and industry throughout the United States
and in other countries. Stephens is an internationally recognized author, speaker, and
consultant. He may be contacted at [email protected].
References
Clayton, Gary. “Safeguarding the World’s New Currency.” The Information Management
Journal 36, no. 3, 2002.
Duff, Wendy, Wally Smieliauskas, and Holly Yoos, “Protecting Privacy.” The Information
Management Journal 35, no. 4, 2001.
Fjetland, Michael.“Global Commerce and the Privacy Clash,” The Information Management
Journal 36, no. 1, 2002.
Haller, Susan.“Privacy: What Every Manager Should Know.” The Information Management
Journal 36, no. 3, 2002.
Holmes, Allan. “Riding the California Privacy Wave.” CIO, 15 January 2005.
Swartz, Nikki. “Offshoring Privacy,” The Information Management Journal 38, no. 5, 2004.
________, editor.“U.S., Canadian Firms Have Different Views of Privacy.” The Information
Management Journal 38, no. 5, 2004.
Worlton, Amy. “Overview of the EU Privacy Directive.” Wiley Rein & Fielding LLP, 2002.
M a y / J u n e 2 0 07
•
The Information Management Journal
59