{"id":179,"date":"2014-01-12T15:09:44","date_gmt":"2014-01-12T23:09:44","guid":{"rendered":"http:\/\/intersticeconsulting.com\/ibtt\/tradeandtaxation\/?page_id=179"},"modified":"2023-02-27T16:51:49","modified_gmt":"2023-02-27T16:51:49","slug":"data-privacy","status":"publish","type":"page","link":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/data-privacy\/","title":{"rendered":"Data Privacy Law: A Practical Guide"},"content":{"rendered":"<p><a href=\"https:\/\/www.amazon.com\/dp\/B076MF6CV8\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-526\" src=\"http:\/\/intersticeconsulting.com\/ibtt\/wp-content\/uploads\/2017\/11\/Book-Cover-242x300.jpg\" alt=\"\" width=\"242\" height=\"300\" srcset=\"http:\/\/intersticeconsulting.com\/ibtt\/wp-content\/uploads\/2017\/11\/Book-Cover-242x300.jpg 242w, http:\/\/intersticeconsulting.com\/ibtt\/wp-content\/uploads\/2017\/11\/Book-Cover-768x953.jpg 768w, http:\/\/intersticeconsulting.com\/ibtt\/wp-content\/uploads\/2017\/11\/Book-Cover-825x1024.jpg 825w, http:\/\/intersticeconsulting.com\/ibtt\/wp-content\/uploads\/2017\/11\/Book-Cover.jpg 1000w\" sizes=\"(max-width: 242px) 100vw, 242px\" \/><\/a><\/p>\n<p>WHAT DO TARGET, GOOGLE, APPLE and SAMSUNG ALL HAVE IN COMMON?<\/p>\n<p><span style=\"color: #000000; text-align: left; line-height: 1.5;\">If you answered&nbsp;<\/span>multimillion-dollar fines<span style=\"color: #000000; text-align: left; line-height: 1.5;\"> for <\/span>data privacy violations<span style=\"color: #000000; text-align: left; line-height: 1.5;\">, you&#8217;d be right.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">But you don&#8217;t have to be Google to face a crippling lawsuit that could threaten the future of your business.<\/span><\/p>\n<p>Second Edition released in October 2017 and written in accessible language by experienced US and internationally-qualified professionals, <strong><a href=\"https:\/\/www.amazon.com\/dp\/B076MF6CV8\" target=\"_blank\" rel=\"noopener\">DATA PRIVACY LAW: A Practical Guide<\/a>&nbsp;<\/strong> (ISBN: 978-0-9995127-1-5, US$49) enables practitioners to develop a quick and comprehensive understanding of your company&#8217;s legal obligations to protect client data.<\/p>\n<h2>Data Privacy Law: A Practical Guide answers questions like<\/h2>\n<ul>\n<li>Which are the key data privacy law standard-setting bodies in the US and internationally?<\/li>\n<li><span style=\"line-height: 1.5;\">Does cross-border selling expose you to data privacy compliance risks in foreign countries?<\/span><\/li>\n<li>Can you effectively offload your legal responsibilities to protect customer data to outsourced third-party service providers like web hosts and payment processors?<\/li>\n<li>How do online marketing strategies like re-targeting affect your exposure to data privacy laws?<\/li>\n<li>What are your legal obligations after discovering a data privacy breach?<\/li>\n<li>What legal risks are involved in Web-based file sharing services like Dropbox?<\/li>\n<li>At what stage must you appoint a <a title=\"Outsourced Data Protection Officer (\u201cDPO\u201d) Services\" href=\"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/services\/outsource-data-protection-officer\/\">Data Protection Officer<\/a>?<\/li>\n<li>How to document your company&#8217;s compliance with its data privacy policy?<\/li>\n<li>&#8230; and many more<\/li>\n<\/ul>\n<p><strong>CONCRETE EXAMPLES<\/strong> are introduced throughout the text and are annotated to illustrate the implications of applicable laws on data privacy policies.<\/p>\n<p><strong>ESSENTIAL SUMMARIES<\/strong>&nbsp;ensure that key applicable data privacy laws of&nbsp;the<strong>&nbsp;US, Canada, EU, Australia and key emerging markets<\/strong>, are taken into account when designing your company&#8217;s data protection policies.<\/p>\n<p>We also provide specific recommended courses of action to follow to <strong>mitigate liability<\/strong> following a data privacy <strong>breach<\/strong>.<\/p>\n<p>We cover both&nbsp;<strong>CONSUMER<\/strong>&nbsp;<strong>and COMPANY<\/strong>&nbsp;data privacy and protection rules.<\/p>\n<p>If you are creating, managing or complying with data privacy policy in an organization, this book was written for you.<\/p>\n<p><a href=\"https:\/\/www.amazon.com\/dp\/B076MF6CV8\" target=\"_blank\" rel=\"noopener\"><strong>BUY THE eBOOK NOW<\/strong><\/a><\/p>\n<h2><strong>Data Privacy Law: A Practical Guide&nbsp;is co-written by<\/strong><\/h2>\n<p><strong>Gwen &#8220;Wendy&#8221; Kennedy<\/strong> BA, JD, LLM (Cantab). Wendy is an international attorney specializing in assisting multinational enterprises in managing their global risks, particularly in relation to compliance, data privacy, and taxation. She is a former university lecturer in international law and is a qualified attorney in the US and a solicitor in the UK.<\/p>\n<p><strong>Leighton Peter Prabhu<\/strong> BCom MPhil (Cantab) CA CPA. Peter is a public accountant, auditor and financial advisor who has worked with clients in more than 25 countries. Peter is particularly experienced in the cross-border e-commerce sector and has worked with both startups and some of the largest international financial institutions.<\/p>\n<h2 class=\"p1\"><span class=\"s1\"><b>Content Overview<\/b><\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">Chapter One provides an overview of data privacy. Answering a few of the more frequently asked questions, including, who needs a data privacy policy, what is the difference between data privacy and data security and where liability may arise.&nbsp;<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Chapter Two examines data privacy laws in both the U.S. and Canada.&nbsp;<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">In Chapter Three the EU General Data Protection Regulation is introduced. The GDPR, when implemented, will be the most stringent data privacy laws in the world and will form the basic tenets for most data privacy laws around the world.&nbsp;<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Chapter Four outlines regional trends around the globe and discusses how data privacy laws differ from country to country, in some cases causing multijurisdictional conflicts.&nbsp;<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Chapter Five examines outsourcing, business-to-business (\u201cB2B\u201d) issues and data breach insurance.&nbsp;<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">In Chapter Six you will find information on what to do in the case of a data privacy breach, how to prevent incidences and reduce risks.&nbsp;<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Chapter Seven sets out what substantive provisions should be included in a data privacy policy and how to draft a policy that conforms with the strictest data privacy laws that might be applicable to your business. It includes suggestions on how to streamline your data privacy policy to maximize the compliance in jurisdictions with less rigorous laws.<\/span><\/p>\n<p class=\"p2\"><a href=\"https:\/\/www.amazon.com\/dp\/B076MF6CV8\" target=\"_blank\" rel=\"noopener\"><strong>BUY THE eBOOK NOW<\/strong><\/a><\/p>\n<h2 class=\"p2\">DATA PRIVACY LAW: A Practical Guide<br \/>\nTable of Contents<\/h2>\n<p>Preface<br \/>\nContent Overview<br \/>\nAcknowledgements<br \/>\nAbout the Authors<\/p>\n<h3>Chapter One: Who Needs a Data Privacy Policy?<\/h3>\n<p>Introduction<br \/>\nWhat is the Difference Between Data Privacy and Data Security?<br \/>\nWhy Do Businesses Collect Personal Information?<br \/>\nIs the Need for a Data Privacy Policy Urgent?<br \/>\nTwo Case Studies: Toysmart and DoubleClick<br \/>\nUse of Third-Party Vendors<br \/>\nWho\u2019s in Charge?<br \/>\nWhat is a Data Protection Officer?<br \/>\nWho Needs a Data Protection Officer?<\/p>\n<h3>Chapter Two: Compliance with Data Privacy Laws: A Survey of U.S. and Canadian Law<\/h3>\n<p>Introduction<br \/>\nUnited States Data Privacy Laws<br \/>\nCanadian Data Privacy Laws<\/p>\n<h3>Chapter Three: EU Data Protection Legislation<\/h3>\n<p>Introduction<br \/>\nEU Historical Concern for Data Privacy and Protection<br \/>\nThe General Data Protection Regulation (&#8220;GDPR&#8221;)<br \/>\nThe Governing Principles<br \/>\nData Transfers Outside the EU<\/p>\n<h3>Chapter Four: Regional Trends and Multijurisdictional Conflicts<\/h3>\n<p>Regional Trends<br \/>\nMultijurisdictional Conflicts in Data Privacy Laws<\/p>\n<h3>Chapter Five: Outsourcing<\/h3>\n<p>Introduction<br \/>\nUse of a Cloud Service Provider to Collect, Store and Transfer Information<br \/>\nData Breach Insurance<\/p>\n<h3>Chapter Six: Responding to an Incident<\/h3>\n<p>Incidence Response Timing and Process<br \/>\nTraining<br \/>\nData Retention and Disposal<br \/>\nEnforcement Actions<\/p>\n<h3>Chapter Seven: The Data Privacy Policy<\/h3>\n<p>Introduction<br \/>\nWhat Should Be Included in a Data Privacy Policy?<br \/>\nContents<br \/>\nData Classification<br \/>\nCombining Personal Information from Multiple Sources<br \/>\nCollecting and Processing Personal Information<br \/>\nRequired Provisions<br \/>\nSample Privacy Policy Template<\/p>\n<h3>Endnotes<\/h3>\n<p>How to Stay Updated<\/p>\n<h2>Additional readings relating to data privacy from our <a href=\"\/ibtt\/\">blog<\/a><\/h2>\n<ul>\n<li><a href=\"\/ibtt\/index.php\/2014\/10\/28\/how-changes-to-uk-consumer-law-affects-ecommerce-businesses\/\">How do Changes to UK Consumer Law Affect E-commerce Businesses?<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/outsourcing-data-management-the-risk\/\">Outsourcing Data Management: The Risk<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/google-facing-lawsuit-for-scanning-data-of-students\/\">Google Facing Lawsuit for Scanning Data of Students<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/employees-need-to-understand-data-security-risks\/\">Employees Need to Understand Data Security Risks<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/france-is-finished-with-big-data-privacy-violations\/\">France is finished with Big Data Privacy Violations<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/new-australian-privacy-laws-for-businesses-the-highlights\/\">New Australian Privacy Laws for Businesses: The Highlights<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/data-protection-where-does-processing-occur\/\">Data Protection: Where does \u201cProcessing\u201d Occur?<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/a-presumption-of-consent-the-cookie-conundrum\/\">A Presumption of Consent \u2013 The Cookie Conundrum<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/what-can-be-learned-from-googles-missteps\/\">What Can Be Learned from Google\u2019s Missteps<\/a><\/li>\n<li><a href=\"\/ibtt\/index.php\/u-s-ftc-cracks-down-on-customer-data-privacy-violations\/\">U.S. FTC Cracks Down on Customer Data Privacy Violations<\/a><\/li>\n<li><a title=\"Data Privacy and Consumer Analytics\" href=\"\/ibtt\/index.php\/data-privacy-and-consumer-analytics\/\">Data Privacy and Consumer Analytics<\/a><\/li>\n<li><a title=\"You don\u2019t need to be Target to get sued over data privacy violations\" href=\"\/ibtt\/index.php\/you-dont-need-to-be-target-to-get-sued-over-data-privacy-violations\/\">You Don&#8217;t Need to be Target to Get Sued Over Data Privacy Violations<\/a><\/li>\n<li><a title=\"2014: Data Privacy and a Big Boon for EU Companies\" href=\"\/ibtt\/index.php\/2014-data-privacy-and-a-big-boon-for-eu-companies\/\">2014: Data Privacy and a Big Boon for EU Companies<\/a><\/li>\n<li><a title=\"Data Privacy in the Cloud\" href=\"\/ibtt\/index.php\/data-privacy-in-the-cloud\/\">Data Privacy in the Cloud<\/a><\/li>\n<li><a title=\"Should Marketing Companies Pay for the Right to Use Personal Information?\" href=\"http:\/\/intersticeconsulting.com\/ibtt\/tradeandtaxation\/should-marketing-companies-pay-for-the-right-to-use-personal-information\/\">Should Marketing Companies Pay for the Right to Use Personal Information?<\/a><\/li>\n<li><a title=\"Does One Size Fit All? Data Privacy Considerations in Global Transactions\" href=\"\/ibtt\/index.php\/does-one-size-fit-all-data-privacy-considerations-in-global-transactions\/\">Does One Size Fit All? Data Privacy Considerations in Global Transactions<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WHAT DO TARGET, GOOGLE, APPLE and SAMSUNG ALL HAVE IN COMMON? If you answered&nbsp;multimillion-dollar fines for data privacy violations, you&#8217;d be right. But you don&#8217;t have to be Google to face a crippling lawsuit that could threaten the future of your business. Second Edition released in October 2017 and written in accessible language by experienced &hellip; <a href=\"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/data-privacy\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Data Privacy Law: A Practical Guide<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"nf_dc_page":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/pages\/179"}],"collection":[{"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/comments?post=179"}],"version-history":[{"count":5,"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/pages\/179\/revisions"}],"predecessor-version":[{"id":595,"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/pages\/179\/revisions\/595"}],"wp:attachment":[{"href":"http:\/\/intersticeconsulting.com\/ibtt\/index.php\/wp-json\/wp\/v2\/media?parent=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}