This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: [email protected] Thank You! Terms of Service and Privacy Issues July 27, 2016 Jeffrey Batt Vice President Marsh & McLennan Companies 202-263-7880 [email protected] Alan Fishel Partner Arent Fox, LLP 202-857-6450 [email protected] Nicholas Lawson Associate Arent Fox, LLP 202-350-3706 [email protected] Disclaimer No entities or persons, including the drafters of this PowerPoint and the presenters of the webinar, may be held responsible for the use which may be made of the information contained in this PowerPoint and presented during the webinar. Nothing in this PowerPoint or presented during the webinar is meant to constitute legal or insurance advice. 3 Terms of Service – Separate Enterprise Agreement • • • • • Liability under multiple agreements Liability for multiple parties Conflicting obligations Additional obligations Misleading statements (e.g., this TOS represents all of the terms that govern the parties relationship) 4 Terms of Service – Are Unilateral Modifications Permitted? If so, what are the • Notice requirements relating to such modifications • Limits on such modifications (both with respect to types of modifications permitted and harm that could otherwise occur to customers) • Rights of the customer where such modifications occur 5 Terms of Service –TOS that Include Links • • • • • Not always clear what is even incorporated Links add additional rights and obligations Links can change Links can include links What are the rights of the customer where modifications occur within links 6 Terms of Service – Issues Related to Third Parties • • • • TOS often include customer obligations to third parties (both affiliates and non-affiliates of providers), which can greatly increase customer risk TOS often limit provider obligations with respect to third party content or technology, which can undermine protections customers thought they otherwise had (also rights customers thought they had can disappear) Definitions are critical here Sometimes TOS is not even from the same party with whom a customer is entering into its enterprise customer agreement 7 Terms of Service – Provider Use of Contractor/Agents • Obligations of Contractor/Agents • Whether actions of Contractors/Agents are attributable to Provider 8 Terms of Service – Limits on Customer’s Permitted Use • • • • Who How much What There is often a lack of clarity here 9 Terms of Service – Customer Responsibility for Accounts • • • • Payments Liabilities Exceptions rarely stated, but should be What are the issues with the following typical language: “You are responsible for any use that occurs under your Login Credentials, including any activities by you or your employees, contractors or agents” 10 Terms of Service – At Least Partially Misplaced Customer Responsibilities • Some TOS inexplicably seek to require that customers be responsible for what the provider is supposed to provide • Many TOS have ambiguous sentences that could lead to unduly broad interpretations of customers’ responsibilities 11 Terms of Service – At Least Partially Misplaced Customer Responsibilities, cont’d • Examples of the issue raised in the second bullet point on the prior page: • “You are solely responsible for Your Content” • “You are responsible for ensuring full compliance with any laws or regulations that apply to Your Content” 12 Terms of Service – Requirements / Restrictions • TOS may have Customer requirements that can lead to termination where they should only give rise to exclusions from provider responsibility • Many customers believe TOS restrictions on use are often overbroad. For example, a TOS may state that you shall not use the Services in a manner that “a reasonable person may think is unlawful or constitutes a tort” 13 Terms of Service – Requirements / Restrictions, cont’d • TOS restrictions for which Customer is rightly responsible should often make it clear that Customer is only responsible as between Customer and Provider • Example of such a clause that should be clarified: “You are solely responsible for any software, product or service that a third party licenses, sells or makes available to you that you install or use with the Service Offering” 14 Terms of Service – Requirements / Restrictions, cont’d • TOS often include many provisions for which customers have no right to cure (such as violations of any “restrictions” in the TOS), but these clauses are often more aggressive than they need to be • TOS frequently include IP and feedback issues that place customers in a difficult position 15 Terms of Service – Suspension / Termination • • • Providers need to make sure they have enough flexibility, particularly with respect to suspensions, to keep their services running smoothly Customers, on the other hand, want to restrict suspensions, particularly those without advance notice and opportunity to cure, to a very limited group of circumstances Customers also want to make sure that providers do not have a right to terminate where all they truly need is a right to suspend 16 Terms of Service – LOL and Indemnification • Limitation of liability and indemnification issues have been covered in great detail in many of our other presentations, but one interesting issue in TOS in particular with respect to LOL is that many of these provisions are so one-sided that they will not be enforceable in some courts 17 GDPR • Background on the General Data Protection Regulation (GDPR) • EU views on privacy – fundamental human right 18 GDPR cont’d KEY TAKEAWAYS: increases individual privacy, greater regulatory powers 1. IMPLEMENTATION – directly applicable in all Member States 2. SCOPE – applies to companies physically located in the EU AND non-EU companies that offer goods/services to EU data subjects or process their data 3. CONSENT REQUIREMENTS – needs to be crystal clear, can be revoked 4. **ROBUST COMPLIANCE OBLIGATIONS** -- self-assess for high risk. If so, conduct impact assessments, mitigate risk, appoint data protection officer 5. **MANDATORY BREACH NOTIFICATION** -- within 72 hours of incident awareness, notify Member State data protection authorities 6. ***SANCTIONS*** -- greater of up to €20M euro or 4% of revenue 19 GDPR cont’d RISK IMPACT: • WHO WILL BE AFFECTED • HOW SHOULD BUSINESSES PREPARE – “Privacy by design”, more oversight, strong emphasis on managing external relationships INSURANCE CONSIDERATIONS • DO EXISTING CYBER POLICIES PROVIDE COVERAGE • INCREASED RISK FOR CARRIERS, BUT ALSO SOME POTENTIAL BENEFITS 20 GDPR cont’d IS BREXIT A GAME-CHANGER FOR UK ADHERENCE? PROBABLY NOT . . . • Once the UK officially leaves the EU, they will (in all likelihood) continue to abide by GDPR • Geopolitical, legal, and economic reasons why the UK will remain aligned: – Continued customer access – Emphasis on stability and minimizing uncertainty – Policymakers will be driving this process, who were overwhelmingly in favor of “Remain” 21 GDPR cont’d Takeaways • Companies need to start preparing for GDPR now • Incorporate GDPR into your cyber/privacy risk conversations and planning, as appropriate 22 Privacy Shield – Background • Companies that transfer EU individuals’ personal information from the EU to the US must have a legal mechanism in place for doing so • The Privacy Shield is one of these legal mechanisms • It is the replacement for the US-EU Safe Harbor framework, which was invalidated by the EU’s highest court last year 23 Privacy Shield – 7 Requirements • The Privacy Shield has seven primary requirements, which are similar to those of the now-defunct Safe Harbor 1. Notice 2. Choice 3. Accountability for Onward Transfer 4. Security 5. Data Integrity/Purpose Limitation 6. Access 7. Recourse, Enforcement And Liability 24 Privacy Shield – Should You Use It? • • • Whether a company should choose to join the Privacy Shield or comply with the GDPR using SCCs or BCRs would depend heavily on the facts and circumstances relevant to its specific situation, including its operational competencies, the maturity of its privacy/security program, and its level of risk tolerance The adequacy of Standard Contractual Clauses have been challenged in the Irish High Court. This case will shortly be transferred to ECJ. Though the ECJ is unlikely to rule on the case in the near term, the proceedings raise doubts about the legitimacy of data transfers using the SCCs. BCRs may likewise become subject to a similar challenge 25 Privacy Shield – Should You Use It? cont’d • • If a company decides to join the Shield within two months from its effective date of July 12, 2016, it will have 9 months from the day it joins to renegotiate contracts with existing third parties who handle EU personal data on its behalf, and add the necessary language required by the Shield. All other requirements will apply from the date the company joins the Shield. If a company joins more than two months after the effective date, it will not receive the 9-month grace period with respect to third party contracts referenced above 26 Privacy Shield – Joining • Joining the Privacy Shield is similar to the process for joining the now-defunct safe harbor 1. Eligibility 2. Privacy Statement 3. Independent Recourse Mechanism 4. Verification Mechanism 5. Designated Contact 27 Privacy Policies – General Concerns • Definition of Data and Personal Data • Definition of Data Breach • Customers need to be careful about inadvertent transfers of ownership with respect to their data 28 Privacy Policies – General Concerns cont’d • Customers should be on the lookout for obligations or restrictions that they are not anticipating in privacy policies, or that may be overly broad, such as the following: • “You will ensure compliance with all applicable privacy and data protection laws with respect to Your Content” • “You will ensure that you have obtained (or will obtain) all consents and rights necessary for us to process Content in accordance with this Privacy Policy” • “You will not upload any data which is regulated by the US Health Insurance Portability and Accountability Act into the Service Offering” 29 Privacy Policies – General Concerns cont’d • Customers need to be concerned about what data is collected • Use and disclosure rights and obligations for customer data should ordinarily be treated separately in privacy policies; otherwise use rights arguably can be used to give providers the right to disclose customer data to third parties in ways customers are not intending to permit 30 Privacy Policies – The Three W’s • The Three W’s • What rights and obligations does a provider have in connection with customer data • Who has access to customer data • Where will the facilities receiving, storing, and transmitting customer data be located 31 Privacy Policies – The Three W’s – What • Where appropriate, Customers will want a requirement that the Provider encrypt Customer data, and for the Provider to have limited rights to decrypt • In addition to generally requiring a Provider to follow applicable law, Customers may want to reference specific applicable laws (e.g., HIPAA) • Providers, however, need to be cautious about agreeing to comply with specific laws that govern the use of certain data 32 Privacy Policies – The Three W’s – What cont’d • Customers generally want to greatly restrict a Provider’s use of customer data • Customers often want to restrict such uses to something like the following: “Provider may use customer data for the sole purpose of providing the services to Customer” 33 Privacy Policies – The Three W’s – What cont’d • Providers generally want their use rights to be far broader, such that they may also include, among other things, -- Preventing fraud -- Protecting Provider’s rights and the rights of others -- Protecting the network -- Marketing -- Improving Provider’s products -- For Provider’s own legitimate business purposes -- As permitted by law 34 Privacy Policies – The Three W’s – What cont’d • Providers often try to obtain maximum flexibility by using words like “generally,” “ordinarily,” “usually,” “primarily,” and “typically” to describe their use rights with respect to customer data • Also, Providers often seek the right to use deidentified data for any purpose, which raises issues about, among other things, whether the data is truly de-identified, and how easily the data could be re-identified 35 Privacy Policies – The Three W’s – What cont’d • With respect to purportedly de-identified data, Customers will want assurances that all direct and indirect personal identifiers are removed such as name, ID numbers, date of birth, and so on • Customers may require that Providers agree not to attempt to re-identify the data, and not let their contractor/agents do it either • Providers, however, should be careful with respect to what they agree to in connection with their contractor/agents given their existing agreements 36 Privacy Policies – The Three W’s – What cont’d • Let’s discuss concerns with this provision, which seeks to address what happens to customer content at the end of the term of the Agreement If you do not delete Your Content before your Agreement expires, we will retain Your Content for a period of 90 days following the effective date of that expiration. During this 90-day period, you will not have access to our Service Offering but, on written request, we can either provide you with reasonable assistance to retrieve a copy of Your Content or delete Your Content for you. We may delete Your Content at any time after this 90-day period. 37 Privacy Policies – The Three W’s – Who • Customers often want, among other things, • The right to access their own data in Provider’s system • Limits on the Provider employees who may access the data • Obligations regarding training and background checks for Provider personnel with access to the data • Prohibition on the Provider’s disclosure of data to any third-parties other than its contractors/agents for whom it is responsible, or in response to a legal request upon 30 days advance notice to Customer • Advance notice of who will receive access to the data 38 Privacy Policies – The Three W’s – Who • • In addition to their contractors/agents, Providers often want to be able to disclose customer data to • Affiliates • Business partners • Any entity that Customer requests or otherwise approves Provider’s release of customer data • In connection with transfers of control • If otherwise permitted under the Privacy Policy • To the extent permitted by law Customers should be concerned not only with respect to who receives their data, but also with respect to who is responsible for a failure to secure that data 39 Privacy Policies – The Three W’s – Where • • • Customers often include geographical requirements for where data must be stored (e.g., in data centers only in the United States unless Customer otherwise consents) Providers, on the other hand, often want to be able to store customer data in “any lawful location” Some providers also include language such as the following: “To the extent you provide Your Content in connection with customer support, you acknowledge and agree that we may handle Your Content in any country in which we or our subcontractors maintain facilities” 40 Privacy Policies – Additional Concerns • From the Provider’s perspective there are a number of important considerations when drafting a Privacy Policy. Some of these include the following: • • • Ensuring you adequately explain how you use and share the data you collect, and ensuring such description is accurate Making sure your Privacy Policy is easily accessible (if it’s not, it may not be enforceable) Ensuring that you are complying with the numerous laws which may be applicable (e.g., COPPA if your website targets children; CalOPPA if you operate a commercial website used or visited by a consumer residing in California, the CANSPAM Act ) 41 Data Security • Some general requirements Customers require from Providers to secure customer data may include • Requiring that Provider use at least commercially reasonable best practices when storing and processing Customer data • Requiring that Provider secure Customer data against unauthorized access • Requiring provider undertake data security audits (e.g., SSAE 16 SOC 2 audit, ISO 27001 audit) • Requiring that Provider secure Customer data against unauthorized access 42 Data Security • Requiring that the measures that Provider takes are at least as protective as Provider uses to secure its own data of a similar type 43 Data Breaches • When a data breach occurs, most Customers want Providers to, among other things, -- Timely notify customer -- Promptly investigate and provide Customer with detailed information regarding the breach -- Promptly take all actions necessary to mitigate the effects and, if possible, remedy the breach 44 Managing Cyber Risk WHY CORPORATE COUNSEL NEEDS TO BE INVOLVED • Just like senior financial management, it is essential for corporate counsel to partake in cyber risk discussions and related decision-making • Counsel is ideally situated to understand risk scope and related preparedness/mitigation measures • Overview of counsel’s key function at each stage of the cyber resiliency process 45 Managing Cyber Risk cont’d Roadmap to Cyber Resilience 3 Address financial loss / earnings disruption in a costeffective manner Design risk transfer and financing (Insurance + $$$ Outlay Risk Identification and Assessment (Strategic) 1 Identify, understand, assess, and manage cyber risks at board level 2 Protect operations and assets and plan for potential breaches Cyber Resilience Prepare for attacks and plan for breaches (Operational/ Tactical) 46 Managing Cyber Risk cont’d OTHER CONSIDERATIONS • Contracts and Third-Party Vendors • Preliminary Cyber Insurance Discussions – Tech E&O – Security Liability – Privacy Liability – **Regulatory Action** • Real-life examples of corporate counsel leading the cyber risk conversation 47 If you have any questions, please contact Jeffrey Batt Vice President Marsh & McLennan Companies 202-263-7880 [email protected] Alan Fishel Partner Arent Fox, LLP 202-857-6450 [email protected] Nicholas Lawson Associate Arent Fox, LLP 202-350-3706 [email protected] 48 Thank you for attending another presentation from ACC’s Webcasts Please be sure to complete the evaluation form for this program as your comments and ideas are helpful in planning future programs. If you have questions about this or future webcasts, please contact ACC at [email protected] This and other ACC webcasts have been recorded and are available, for one year after the presentation date, as archived webcasts at http://www.acc.com/webcasts
© Copyright 2026 Paperzz