privacy and information governance challenges in the age of big data part ii kateri-anne grenier...

16
Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th , 2014

Upload: austin-long

Post on 16-Jan-2016

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

Privacy and Information Governance Challenges in the Age of Big Data

PART IIKateri-Anne GrenierPartnerNorton Rose Fulbright Canada LLP October 26th, 2014

Page 2: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

SUMMARY

I. Introduction

A. Definition

B. Did you know?

II. Big Data Breach Issues

A. Review of key principles

B. Adequacy of the legal framework?

1. Volume Issues

2. Data Use

III. Litigation and Evidentiary ChallengesA. ESI / E-discovery Definitions

B. ESI / E-discovery Issues

1. Canada2. USA3. EU

IV. Advising on Management of Big Data

A. Retention

B. Preservation

C. Destruction

2 of 16

Page 3: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

INTRODUCTION

3 of 16

Page 4: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

A. Definition:

Big Data: Extremely large data sets that may be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.

(Oxford Dictionary)

Introduction

4 of 16

Page 5: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

Introduction• “In the third century BC, the Library of Alexandria was believed to house

the sum of human knowledge. Today, there is enough information in the world to give every person alive 320 times [what] historians think was stored in Alexandria’s entire collection” (Cukier and Schoenberger)

• If all this information was placed on stacked up CDs, it would form 5 separate piles that would all reach to the moon

• Only 10% of the existing information on a person is actually created by this person. The other 90% emanates from credit records, surveillance images, analytics on behavior, web-use histories, etc.

• 1 million customer transactions per hour feed into Wal-Mart’s databases, which is more data than held by America’s Library of Congress multiplied by 167

• TJX was required to pay $250 million following a Big Data breach

.

5 of 16

B. Did you know …

Page 6: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

I. BIG DATA BREACH ISSUES

6 of 16

Page 7: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

I. Big Data Breach Issues (New Privacy Challenges Arising Out of Big Data)

A. Review of key principles

• Consent: knowledge and consent of the individual required for the collection, use, or disclosure of PI, except where inappropriate

• Identifying Purposes: purposes for which PI is collected shall be identified at or before the time the information is collected

• Limiting Collection: PI collection limited to what is necessary for its purposes

• Limiting Use, Disclosure, and Retention: PI not to be used/disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by law. PI to be retained only as long as necessary

• Openness: specific information to be made to individuals about an organizations’ policies and practices relating to the management of PI

• Safeguards: PI protected by security safeguards appropriate to the sensitivity of the information

• Individual Access: Upon request, an individual shall be informed of the existence, use, and disclosure of his/her PI and shall be given access to it

7 of 16

Page 8: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

I. Big Data Breach Issues (New Privacy Challenges Arising Out of Big Data)

B. Adequacy of the legal framework?

1. Volume Issues

Limiting Collection:

– Limitless collection possible. Many companies tempted to collect more and more. Cheaper to stash than sort

– Tremendous amount of collected data makes breaches difficult to be detected.

– Serious breach costs and consequences (financial, reputational, legal, etc.) – e.g. TJX USA

Openness:

– Assuring individuals access to their PI can be extremely difficult with extremely large amounts of data without proper information management

– It is becoming difficult to explain to data subjects in a simple and clear way the technicalities behind the use of PI

8 of 16

Page 9: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

B. Adequacy of the legal framework?

2. Data use issues

Limiting Use, Disclosure, and Retention:

- Predictive analytics: Big Data can be used to predict our intentions and our future behaviors

- Organizations may be tempted to use collected Big Data for predictive analytics beyond its intended collection purposes and retention periods e.g. pregnancy-prediction algorithm, Airline passenger lists

- Big Data collected for potential but unclear uses which may not be in accordance with the limited use, disclosure and retention principles set out in the law and/or in the company’s privacy policy

Consent:

- Organizations may struggle to provide data subjects basic understanding on how personal information will be used in order to gain informed consent

- The wording of consents doesn’t always reflect the eventual use of the PI (e.g. ‘for marketing purposes’ v. predictive analytics)

9 of 16

I. Big Data Breach Issues (New Privacy Challenges Arising Out of Big Data)

Page 10: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

II. LITIGATION AND EVIDENTIARY CHALLENGES

10 of 16

Page 11: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

A. Definitions:

ESI: Electronically Stored Information, refers to all information stored in computers and storage devices (E-mail, voicemail, instant and text messages, databases, metadata, digital images, etc.)

E-discovery: Obligation parties to a trial have to exchange electronic documents (e-mails, messages, e-calendars and various data)

II. Litigation and Evidentiary Challenges

11 of 16

Page 12: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

II. Litigation and Evidentiary Challenges

B. ESI / E-discovery Issues

•Big Data involves a significant increase in all of the risks associated with the protection of privacy (reputational, operational, financial, legal, etc.)

•The more Big Data that a party holds, the more information it might be obligated to communicate to another party in the course of litigation

•Amassing vast quantities of data can give rise to e-discovery risks in relation to such data e.g. Adverse parties request for disclosure of non-filtered Data in its entirety

1. Canada

– Few cases related to Big Data due to overarching private sector privacy law

• USA

Research

– Large volume of data and misspelled information makes traditional and key word searches less useful

– ESI custodians required for dealing with document requests

– Predictive coding techniques commonly used in the US: Selection of a group of documents (seed set) considered relevant. Predictive coding tools analyze these documents’ text in order to find other files of the same type. See: Da Silva Moore v. Publicis Group (first US judicial decision to endorse predictive coding)

12 of 16

Page 13: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

II. Litigation and Evidentiary Challenges

B. ESI / E-discovery Issues

Costs

– ESI searching in e-discovery involves a significant and wasteful cost to companies that need to produce thousands of documents in court files (e.g. search time, outsourcing to experts, etc.)

Race Tires America, Inc. v. Hoosier Racing Tire Corp.; Dirt Motor Sports, Inc (2012): E-discovery production costs not to be passed to other party

Mancia v. Mayflower Textile Servs. Co. (2008): Cooperation between parties is to be encouraged

Pippins v. KPMG LLP (2012): Cooperation with other party over scope of collection would have led to lower costs

3. Europe

– A 60,000 person class action has been lodged against Facebook for violations of European Privacy laws (non-existent in the U.S.). Plaintiffs wish to force Facebook to be more transparent with their use of personal data

– 1,222 pages of information collected by Facebook on one individual

– Max Schrems, ‘Fight for your Data!’

13 of 16

Page 14: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

III. ADVISING ON MANAGEMENT OF BIG DATA

14 of 16

Page 15: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

III. Management of Big Data According to PCOCataA. Retention

Clearly define information collection purposes (marketing, client lists, etc.) Restrict information collection to what is reasonably necessary for these defined purposesRelate collected information to an activity

B. Preservation

Create policies to address the whole lifecycle of a collected data (from collection to destruction)

Properly manage data so that individuals can have access to their personal information

Provide a clear explanation of how people can obtain access to their personal information held by your organization, and how they can request correction or deletion of this information

Structure your privacy policies for ease of reference: be transparent

Ensure that your employees are aware of data breach consequences

C. Destruction

Set retention periods for each type of information and/or document

When creating such periods, consider document format, information purposes, risks of retention and legislative requirements

Create a policy for irreversibly destroying data so that information reconstruction or recovery will be impossible

Use deleting methods that resist simple recovery methods

15 of 16

Page 16: Privacy and Information Governance Challenges in the Age of Big Data PART II Kateri-Anne Grenier Partner Norton Rose Fulbright Canada LLP October 26 th,

Thank you !