California privacy law: practical guide and commentary : U.S. federal and state law
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco, California
The Recorder
2017
|
Ausgabe: | 2nd edition |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XLIII, 502 Seiten |
ISBN: | 9781628812046 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044333986 | ||
003 | DE-604 | ||
005 | 20171023 | ||
007 | t | ||
008 | 170601s2017 |||| 00||| eng d | ||
020 | |a 9781628812046 |9 978-1-62881-204-6 | ||
035 | |a (OCoLC)1011375868 | ||
035 | |a (DE-599)BVBBV044333986 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a PZ 4900 |0 (DE-625)141185: |2 rvk | ||
100 | 1 | |a Determann, Lothar |e Verfasser |4 aut | |
245 | 1 | 0 | |a California privacy law |b practical guide and commentary : U.S. federal and state law |c Lothar Determann |
250 | |a 2nd edition | ||
264 | 1 | |a San Francisco, California |b The Recorder |c 2017 | |
300 | |a XLIII, 502 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, eBook |z 978-1-62881-205-3 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029737172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029737172 |
Datensatz im Suchindex
_version_ | 1804177561600655360 |
---|---|
adam_text | Table of Contents
Chapter 1: California Privacy Law Overview.........................1
1-1 Chapter Overview..............................................1
1-2 California....................................................1
1-2:1 Laws Made by California.............................. 2
1-2:2 Scope and Applicability of California Laws.............4
1-2:2.1 Limitations on California Jurisdiction
Under International Law....................4
l-2:2.2 Limitations on California Jurisdiction
Under Federal Law..........................9
1-2:2.3 California Conflict of Law Rules............12
l-2:2.4 Enforceability of California Laws
Outside California........................17
1-3 Privacy......................................................19
1-3:1 R ights to Privacy and Data Privacy.................19
1-3:2 Data Protection, Data Privacy and Data Security.....23
1-3:3 Property........................................... 25
1-3:4 Free Speech, Information............................27
1-4 Law..........................................................30
1- 5 California Privacy Law Summary...............................32
1-5:1 Scope............................................. 32
1-5:2 Terminology.........................................32
1-5:3 Key Features........................................34
1- 5:4 California Privacy Law—What It Is Not...............35
Chapter 2: California Privacy Laws from A to Z.....................39
2- 1 Chapter Overview...........................................39
2-2 Article 1 of the California Constitution.....................40
2- 2:1 Who and What Data Is Protected?.....................42
2-2:2 Who Must Comply?....................................42
2-2:3 How to Comply?......................................43
2-2:4 Sanctions and Remedies..............................45
CALIFORNIA PRIVACY LAW xxvii
Table of Contents
2-3 Being Let Alone.............................................46
2-3:1 Who and What Data Is Protected?....................46
2-3:2 Who Must Comply?...................................47
2-3:3 How to Comply?.....................................47
2-3:4 Sanctions and Remedies.............................49
2-4 Computer Interference Laws..................................49
2-4:1 Computer Fraud and Abuse Act.......................51
2-4:1.1 Who and What Data Is Protected?..........51
2-4:1.2 Who Must Comply?.........................52
2-4:1.3 How to Comply?...........................52
2-4:1.4 Sanctions and Remedies...................52
2-4:2 California Comprehensive Computer Data
Access and Fraud Act...............................54
2-4:2.1 Who and What Data Is Protected?..........54
2-4:2.2 Who Must Comply?.........................54
2-4:2.3 How to Comply............................55
2-4:2.3a Website Terms and
the Drew Case.................57
2-4:2.3b Unauthorized Computer
Access by Employees
or Ex-Employees...............57
2-4:2.3c Scraping, Data Harvesting.......58
2-4:2.4 Sanctions and Remedies...................59
2-5 Data Security Requirements..................................60
2-5:1 Security of Personal Information...................61
2-5:1.1 Who and What Data Is Protected?..........61
2-5:1.2 Who Must Comply?.........................62
2-5:1.3 How to Comply........................ 62
2-5:1.4 Sanctions and Remedies...................62
2-5:2 Disposal of Customer Records ........................63
2-5:2.1 Who and What Data Is Protected?..........63
2-5:2.2 Who Must Comply?.........................63
2-5:2.3 How to Comply?...........................63
2-5:2.4 Sanctions and Remedies...................64
2-5:3 Wireless Network Security..........................64
2-5:3.1 Who and What Data
Is Protected?............................64
2-5:3.2 Who Must Comply?.........................64
2-5:3.3 How to Comply?...........................65
2- 5:3.4 Sanctions and Remedies...................65
2-5:4 Social Security Numbers............................66
2-5:4.1 General Restrictions.....................66
xxviii CALIFORNIA PRIVACY LAW
Table of Contents
2-5:4.2 Social Security Number Truncation
on Pay Stubs.............................68
2-5:5 Automated License Plate Recognition (ALPR)
Systems...........................................69
2-5:5.1 Who and What Data Is Protected?...........69
2-5:5.2 Who Must Comply?..........................69
2-5.5.3 How to Comply?.......,....................69
2-5:5.4 Sanctions and Remedies....................71
2-5:6 Student Online Personal Information.................71
2-5:7 Payment Card Industry Security Standards.............72
2-5:8 Cyber security.......................................72
2-5:9 Data Security by Design - Requirements for
Product Manufacturers..............................72
Employee Privacy ..........................................73
2-6:1 Overview—Workplace Privacy in General................75
2-6:2 California Labor Code § 226..........................77
2-6:2.1 Who and What Data Is Protected?...........77
2-6:2.2 Who Must Comply?..........................78
2-6:2.3 How to Comply?............................78
2-6:2.4 Sanctions and Remedies....................78
2-6:3 California Labor Code § 435..........................79
2-6:3.1 Who and What Data Is Protected?...........79
2-6:3.2 Who Must Comply?..........................79
2-6:3.3 How to Comply?............................80
2-6-.3.4 Sanction and Remedies.....................80
2-6:4 California Labor Code § 980..........................80
2-6:4.1 Who and What Data Is Protected?...........81
2-6:4.2 Who Must Comply?..........................81
2-6:4.3 How to Comply?............................81
2-6:4.4 Sanctions and Remedies....................81
2-6:5 Other Laws Specifically Addressing Employers.........82
2-6:5.1 California Labor Code§ 1026...............82
2-6:5.2 ID Device Implants—California
Civil Code §52.7.........................82
2-6:5.3 Background Checks—Fair Credit
Reporting Act............................82
2-6:5.4 Health Information........................82
2-6:5.5 Polygraphs................................83
2-6:5.6 Subpoenas.................................83
2-6:5.7 Anti-Discrimination Laws..................83
Financial Information......................................83
CALIFORNIA PRIVACY LAW xxix
Table of Contents
2-7:1 Federal F inancial Institutions
Regulation—Gramm-Leach-Bliley Act..................84
2-7:1.1 Who and What Data Is Protected?...........85
2-7:1.2 Who Must Comply?..........................86
2-7:1.3 How to Comply?............................86
2-7:1.4 Sanctions and Remedies....................88
2-7:2 Financial Institutions Regulation—California
Financial Information Privacy Act.................88
2-7:2.1 Who and What Data Is Protected?...........89
2-7:2.2 Who Must Comply?........................ 90
2-7:2.3 How to Comply?........................... 90
2-7:2.3a Sharing With Third Parties
that Are neither Affiliates
Nor Financial Institutions....90
2-7:2.3b Sharing With Affiliates.........91
2-7:2.3c Sharing With Nonaffiliated
Financial Institutions........92
2-7:2.4 Sanctions and Remedies.....................92
2-7:3 Consumer Reports, Background
Checks - Federal Fair Credit Reporting Act.........92
2-7:3.1 Who and What Data Is Protected?........93
2-7.-3.2 Who Must Comply?..........................93
2-7:3.3 How to Comply?............................94
2-7:3.3a Consumer Reporting Agencies....95
2-7:3.3b Users of Consumer Reports.......95
2-7:3.3c Furnishers of Reports...........96
2-7:3.4 Sanctions and Remedies.....................96
2-7:4 Consumer Reports, Background Checks—California
Consumer Credit Reporting Agencies Act.............98
2-7:4.1 Who and What Data Is Protected?........99
2-7:4.2 Who Must Comply?.........................100
2-7:4.3 How to Comply?...........................100
2-7:4.3a Consumer Credit Reporting
Agencies Compliance
Obligations..................100
2-7:4.3b Requirements on Users of
Consumer Credit Reports......102
2-7:4.3c Obligations of Furnishers of
Credit Information...........103
2-7:4.4 Sanctions and Remedies....................104
2-7:5 Debt Collection—Federal Fair Debt Collection
Practices Act.....................................105
xxx CALIFORNIA PRIVACY LAW
Table of Contents
2-7:5.1 Who and What Data Is Protected?...........106
2-7:5.2 Who Must Comply?..........................106
2-7:5.3 How to Comply?............................106
2-7:5.4 Sanctions and Remedies....................109
2-7:6 Debt—California Law..................................110
2-7:6.1 Who and What Data Is Protected?...........Ill
2-7:6.2 Who Must Comply?..........................111
2-7:6.3 How to Comply?............................112
2-7:6.4 Sanctions and Remedies...................113
2-7:7 Federal Right to Financial Privacy Act...............114
2-7:8 California Right to Financial Privacy Act............114
2-7:9 The California Song-Beverly Credit Card Act..........115
2-7:9.1 Who and What Data Is Protected?...........115
2-7:9.2 Who Must Comply?..........................115
2-7:9.3 How to Comply?..............................116
2-7:9.3a Consent..........................117
2-7:9.3b Separating Data Collection
from Credit Card Transaction.... 118
2-7:9.3c Express Statutory Exceptions.... 120
2-7:9.3d Returns and Refunds..............121
2-7:9.4 Sanctions and Remedies....................121
2-7:10 Collection of Personal/Credit Card Information
in Retail Transactions..............................123
2-7:10.1 Who and What Data Is Protected?...........124
2-7:10.2 Who Must Comply?..........................124
2-7:10.3 How to Comply?............................124
2-7:10.4 Sanctions and Remedies....................125
2-7:11 Credit Card Full Disclosure..........................125
2-7:11.1 Who and What Data Is Protected?...........126
2-7:11.2 Who Must Comply?..........................126
2-7:11.3 H ow to Comply?...........................126
2-7:11.4 Sanctions and Remedies.....................127
2-7:12 Other Laws Specifically Protecting
Financial Information...............................127
2-7:13 Payment Card Industry Standards......................128
2-8 Government...................................................128
2-8:1 Federal Statutes.....................................129
2-8:2 California Statutes..................................130
2-9 Health And Medical Information...............................132
2-9:1 GINA.................................................133
2-9:1.1 Who and What Data Is Protected?............133
2-9:1.2 Who Must Comply?..........................133
CALIFORNIA PRIVACY LAW xxxi
Table of Contents
2-9:1.3 How to.Comply?..........................134
2-9:1,4 Sanctions and Remedies..................135
2-9:2 HI PA A..........................................136
2-9:2.1 Who and What Data Is Protected?.........136
2-9:2.2 Who Must Comply?........................137
2-9:2.3 How to Comply?..........................138
2-9:2.4 Sanctions and Remedies .................142
2-9:3 California Confidentiality of Medical Information
Act (CMIA).......................................144
2-9:3.1 Who and What Data Is Protected?.........145
2-9:3.2 Who Must Comply?........................145
2-9:3.3 How to Comply?..........................146
2-9:3.4 Sanctions and Remedies..................147
2-9:4 Other California Health Information
Privacy Laws.....................................149
2-9:4.1 Collection of Medical Information
for Direct Marketing Purposes..........149
2-9:4.2 California Shine the Light Law..........149
2-9:4.3 California Health and Safety Code.......150
2-9:4.4 Records Maintained by State Agencies....150
2-9:4.5 Welfare and Institutions Code...........150
2-9:4.6 Insurance Code..........................151
2-9:5 Data Security Breach Notification.................151
2-10 Identity Theft...........................................152
2-10:1 Who and What Data Is Protected?...................155
2-10:2 Who Must Comply?.................................155
2-10:3 How to Comply?....................................155
2-10:4 Sanctions and Remedies...........................155
2-11 Judicial Proceedings, Law Enforcement....................155
2-11:1 Fourth Amendment..................................156
2-11:2 Companies Compelled to Provide Personal Data....158
2-11:3 Privacy in Court and Government Proceedings......162
2-12 K—Contracting Requirements................................164
2-12:1 Federal Law Requirements for Contracting
on Data Security................................ 164
2-12:2 California Law Requirements for Contracting
on Data Security................................ 166
2-12:3 Requirements for Contracting on Data Security
Implied or Expressly Contained in Contracts......168
2-13 Location Tracking.........................................169
2-13:1 Tracking Devices..................................169
2-13:1.1 Who and What Data Is Protected?.........170
xxxii CALIFORNIA PRIVACY LAW
Table of Contents
2-13:1.2 Who Must Comply?.........................170
2-13:1.3 How to Comply?...........................170
2-13:1.4 Remedies and Sanctions....................172
2-13:2 Automobile Black Boxes..............................172
2-13:2.1 Who and What Data Is Protected?..........172
2-13:2.2 Who Must Comply?.........................172
2-13:2.3 How to Comply?...........................172
2-13:2.4 Sanctions and Remedies....................173
2-13:3 ID Implants.........................................173
2-13:3.1 Who and What Data I s Protected?.........173
2-13:3.2 Who Must Comply?.........................173
2-13:3.3 How to Comply?...........................174
2-13:3.4 Sanctions and Remedies....................174
2-13:4 Rental Car Surveillance.............................174
2-13:4.1 Who and What Data Is Protected?..........174
2-13:4.2 Who Must Comply?.........................174
2-13:4.3 How to Comply?...........................175
2-13:4.4 Sanctions and Remedies....................175
2-14 Mail.........................................................175
2-15 Notification of Data Security Breaches.......................176
2-15:1 General California Data Security Breach
Notification Requirement...........................177
2-15:1.1 Who and What Data I s Protected?.........177
2-15:1.2 Who Must Comply?.........................178
2-15:1.3 How to Comply?...........................178
2-15:1.3a Definition of a Breach........178
2-15:1. 3b Good Faith Access by
Unauthorized Employees.......179
2-15:1.3c Timing........................179
2-15:1.3d Form and Content of
Notifications.................180
2-15:1. 3e Account Credentials
Compromise....................181
2-15:1.3f Mass Breaches.................182
2-15:1.3g Data Processors...............183
2-15:1. 3h Identity Theft Protection.....183
2-15:1.3i No Waivers....................183
2-15:1.3j Risk Mitigation...............183
2-15:1.4 Sanctions and Remedies....................183
2-15:2 Data Breach Notification Requirements
Under Other Laws................................. 184
CALIFORNIA PRIVACY LAW xxxiii
Table of Contents
2-16 Online Privacy...............................................186
2-16:1 Children’s Online Privacy Protection
Act (“COPPA”).....................................186
2-16:1.1 Who and What Data Is Protected?.........186
2-16:1.2 Who Must Comply?........................187
2-16:1.3 How to Comply?..........................189
2-16:!. 4 Sanctions and Remedies..................190
2-16:2 California Online Privacy Protection Act (CalOPPA).191
2-16:2.1 Who and What Data Is Protected?..........191
2-16:2.2 Who Must Comply?........................192
2-16:2.2a Passive Websites..............192
2-16:2.2b Data Processors...............193
2-16:2.2c Websites or Online Services
for Businesses...............193
2-16:2.2d Websites or Online Services
Directed at Children.........193
2-16:2.2e Exemptions Under
Federal Law..................194
2-16:2.3 How to Comply?..........................194
2-16:2.4 Sanctions and Remedies..................195
2-16:3 Student Online Personal Information Protection Act
(SOPIPA)..........................................196
2-16:3.1 Who and What Data Is Protected?.........196
2-16:3.2 Who Must Comply?........................197
2-16:3.3 How to Comply?..........................197
2-16:3.4 Sanctions and Remedies..................197
2-16:4 Other Online Privacy Protection Laws in California.197
2-16:4.1 Anti-Phishing...........................198
2-16:4.2 Spyware.................................198
2-16:4.3 Removal of Home Address from Web........199
2-16:4.4 Cyberbullying...........................200
2-16:4.5 California Government Privacy Policies..201
2-16:4.6 Other Privacy Laws......................201
2-17 Private Investigators........................................201
2-17:1 Who and What Data Is Protected?....................202
2-17:2 Who Must Comply?...................................202
2-17:3 Howto Comply?......................................202
2-17:4 Sanctions and Remedies.............................204
2-18 Quo Vadis, California Privacy Law? Legislative Proposals.....205
2-18:1 Data Security......................................205
2-18:2 Information Privacy and General Privacy............206
2-18:3 Data Sharing, Collection, and Coordination.........210
xxxiv CALIFORNIA PRIVACY LAW
Table of Contents
2-19 Records.....................................................211
2-19:1 The Federal Privacy Act............................211
2-19:2 Education Records—Family Educational Rights
and Privacy Act of 1974 (FERPA)..................211
2-19:2.1 Who and What Data Is Protected?.........212
2-19:2.2 Who Must Comply?........................213
2-19:2.3 How to Comply?..........................213
2-19:2.4 Sanctions and Remedies..................214
2-19:3 Protections for Pupil Records Under the
California Education Code.........................214
2-19:3.1 Who and What Data Is Protected?.........214
2-19:3.2 Who Must Comply?........................215
2-19:3.3 How to Comply?..........................215
2-19:3.4 Sanctions and Remedies..................216
2-19:4 Driver’s Privacy Protection Act of 1994............217
2-19:4.1 Who and What Data IsProtected...........217
2-19:4.2 Who Must Comply?........................217
2-19:4.3 How to Comply?..........................218
2-19:4,4 Sanctions and Remedies..................218
2-19:5 California Driver’s License Information
Confidentiality...................................219
2-19:5.1 Who and What Data Is Protected?.........219
2-19:5.2 Who Must Comply?........................220
2-19:5.3 How to Comply?..........................220
2-19:5.4 Sanctions and Remedies..................220
2-19:6 Other Records Privacy Laws.........................221
2-19:6.1 California Information
Practices—Generally.....................221
2-19:6.2 California Driver’s License Information,
Scanning or “Swiping”...................222
2-19:6.3 California Marriage Licenses and
Other Family Records....................222
2-19:6.4 California Vehicle Dealer Records.......223
2-19:6.5 Federal and California Public
Records Laws............................223
2-19:6.6 California Public Record Exemption
for Sex Offense Victims.................224
2-19:6.7 California Welfare Records..............224
2-19:6.8 Research Use of Personal Data...........224
2-19:6.9 California Law on Collection of
License Plate Information...............225
CALIFORNIA PRIVACY LAW xxxv
Table of Contents
2-20 Supermarket Club Cards......................................225
2-20:1 Who and What Data Is Protected?................225
2-20:2 Who Must Comply?...............................225
2-20:3 How to Comply?.................................226
2-20:4 Sanctions and Remedies............................226
2-21 Torts.......................................................226
2-21:1 Who and What Data Is Protected?....................226
2-21:1.1 Intrusion Upon Seclusion................227
2-21:1.2 Public Disclosure of Private Facts......227
2-21:1.3 False Light.............................228
2-21:1.4 Right to Publicity......................228
2-21:1.5 Stalking and Other Invasions
of Privacy..............................229
2-21:2 Who Must Comply?...............................230
2-21:3 How to Comply?.................................230
2-21:4 Sanctions and Remedies ...........................231
2-22 Unsolicited Marketing Communications........................232
2-22:1 CAN-SPAM Act of 2003..............................233
2-22:1.1 Who and What Data Is Protected?.........233
2-22:1.2 Who Must Comply?........................234
2-22:1.3 How to Comply?..........................234
2-22:1,3a Messages Covered..............235
2-22:1.3b Accurate Header Information...236
2-22:1,3c Opt Out.......................236
2-22:1,3d Sexually Explicit Messages....236
2-22:1.4 Sanctions and Remedies.................237
2-22:1,4a Multiple Emails...............237
2-22:1.4b FTC.......................... 237
2-22:1,4c State Actions.................237
2-22:1,4d Provider of Internet Access
Service......................238
2-22:1,4e Sexually Explicit Messages....239
2-22:2 California Anti-Spam Law..........................239
2-22:2.1 Who and What Data Is Protected?........241
2-22:2.2 Who Must Comply?.......................241
2-22:2.3 How to Comply?.........................242
2-22:2.4 Sanctions and Remedies.................243
2-22:3 Telephone Consumer Protection Act (TCPA)..........244
2-22:3.1 Who and What Data Is Protected?........246
2-22:3.2 Who Must Comply?.......................246
2-22:3.3 How to Comply?.........................247
2-22:3.4 Sanctions and Remedies.................250
xxxvi CALIFORNIA PRIVACY LAW
Table of Contents
2-22:4 California Robocalls Law.............................251
2-22:4.1 Who and What Data Is Protected?..........251
2-22:4.2 Who Must Comply?.........................251
2-22:4.3 How to Comply?...........................251
2-22:4.4 Sanctions and Remedies.....................253
2-22:5 California Do Not Call Law...........................254
2-22:5.1 Who and What Data Is Protected?..........254
2-22:5.2 Who Must Comply?.........................254
2-22:5.3 How to Comply?...........................254
2-22:5.4 Sanctions and Remedies.....................256
2-22:6 Unsolicited Cell Phone/Pager Text Ads................256
2-22:6.1 Who and What Data Is Protected?..........256
2-22:6.2 Who Must Comply?.........................257
2-22:6.3 How to Comply?...........................257
2-22:6.4 Sanctions and Remedies.....................257
2-22:7 Telephone Number Directories.........................258
2-22:7.1 Who and What Data Is Protected?..........258
2-22:7.2 Who Must Comply?.........................258
2-22:7.3 How to Comply?...........................258
2-22:7.3a Residential Numbers.............258
2-22:7.3b Mobile Numbers..................259
2-22:7.3c Exemptions......................259
2-22:7.4 Sanctions and Remedies.....................260
2-22:8 Marketing to State University Alumni.................260
2-22:8.1 Who and What Data Is Protected?..........260
2-22:8.2 Who Must Comply?.........................260
2-22:8.3 How to Comply?...........................261
2-22:8.4 Sanctions and Remedies.....................262
2-23 Video, Connected Television and Books.........................262
2-23:1 Federal and California Video Privacy Protection.....263
2-23:1.1 Who and What Data Is Protected?.........:... 263
2-23:1.2 Who Must Comply?...........................263
2-23:1.3 How to Comply?.............................264
2-23:1.4 Sanctions and Remedies.....................265
2-23:2 Reader Privacy Act...................................265
2-23:2.1 Who and What Data Is Protected?..........266
2-23:2.2 Who Must Comply?.........................266
2-23:2.3 How to Comply?...........................266
2-23:2.4 Sanctions and Remedies.....................267
2-23:3 Connected Television.................................267
2-23:3.1 Who and What Data Is Protected?...........267
2-23:3.2 Who Must Comply?...........................268
CALIFORNIA PRIVACY LAW xxxvii
Table of Contents
2-23:3.3 How to Comply?........................268
2-23:3.4 Sanctions and Remedies.............. 269
2-23:4 Other Laws......................................269
2-24 Wiretapping, Eavesdropping, Communications Privacy......270
2-24:1 The Federal Electronic Communications Privacy
Act (ECPA)......................................270
2-24:1.1 Who and What Data is Protected?.......271
2-24:1.2 Who Must Comply?......................271
2-24:1.3 How to Comply?........................272
2-24:1.4 Sanctions and Remedies................276
2-24:2 The California Invasion of Privacy Act (CIPA)...277
2-24:2.1 Who and What Data is Protected?.......278
2-24:2.2 Who Must Comply?......................278
2-24:2.3 How to comply?........................278
2-24:2.4 Sanctions and Remedies................279
2-24:3 California Telecommunications Customer Privacy.280
2-24:3.1 Who and What Data is Protected?.......280
2-24:3.2 Who Must Comply?......................280
2-24:3.3 How to comply?........................280
2-24:3.4 Sanctions and Remedies................280
2-24:4 Skimming RFID...................................281
2-24:5 Electronic Eavesdropping by State Law
Enforcement Officials.......................... 281
2-24:6 The California Electronic Communications
Privacy Act (CalECPA)...........................282
2-25 XXX—Revenge Pom..........................................282
2-25:1 Who and What Data Is Protected?...............283
2-25:2 Who Must Comply?..............................283
2-25:3 How to Comply?................................284
2-25:4 Sanctions and Remedies..........................284
2-26 Your Privacy Rights—Shine The Light.....................285
2-26:1 Who and What Data Is Protected?...............285
2-26:2 Who Must Comply?..............................285
2-26:3 How to Comply?................................286
2-26:4 Sanctions and Remedies..........................287
2-27 Paparazzi Laws...........................................288
2-27:1 Intrusion into Seclusion by Paparazzi...........289
2-27:1.1 Who and What Data is Protected?........289
2-27:1.2 Who Must Comply?......................289
2-27:1.3 How Comply?...........................290
2-27:1.4 Sanctions and Remedies................290
xxxviii CALIFORNIA PRIVACY LAW
Table of Contents
2- 27:2 California Criminal Paparazzi Law.............291
2-27:2.1 Who and What Data Is Protected?.......291
2-27:2.2 Who Must Comply? .....................291
2-27:2.3 How to Comply?........................291
2-27:2.4 Sanctions and Remedies................291
Chapter 3: Compliance Guide...................................293
3-1 Chapter Overview........................................293
3-2 Starting A Compliance Program...........................293
3-3 Taking Charge...........................................293
3-4 Mobilizing Resources in Your Organization...............295
3- 4:1 Why Companies Should Protect Privacy...........296
3- 4:2 Why Governments Should Protect Privacy..........298
3-5 Appointing a Privacy Officer............................299
3-6 Preparing a Task List...................................300
3-7 Take Inventory of Your Data.............................302
3-8 Define Your Objectives and Priorities...................303
3-9 Find the Best Approach for Your Company.................303
3-10 Identify Legal and Other Requirements..................305
3-11 Executing Tasks.........................................305
3- 12 Maintenance............................................306
Chapter 4: Drafting a Privacy Policy..........................307
4- 1 Chapter Overview........................................307
4-2 Drafting Considerations In General......................307
4- 2:1 Why Are You Creating the Document?.............308
4-2:2 Who Is Your Audience?............................310
4-2:3 Policies Versus Other Documentation..............312
4-3 Privacy Notices, Policies In General....................320
4-3:1 Who Should Issue Notices—the Service Provider
or the Customer?...............................320
4-3:2 Which Topics Do You Typically Have to Address?.... 321
4-3:2.1 Who Is Issuing the Notice?.............321
4-3:2.2 What Is the Scope of the Notice and to
Whom Is the Notice Addressed?.........322
4-3:2.3 What Categories of Data Do
You Collect?..........................322
4֊3:2.4 For What Purposes Do You Collect
Data and What Do You Do With It?......322
4-3:2.5 With Whom Do You Share Data?..........323
4-3:3 Which Topics Should You Not Address?.............324
4-3:4 Form and Delivery Requirements...................325
CALIFORNIA PRIVACY LAW xxxix
Table of Contents
4-4 Privacy Policies For Websites, Apps and Other
Online Services..........................................325
4-4:1 Applicable Laws..................................326
4-4:2 Combined or Multiple Notices to Satisfy
Different Laws...................................329
4-4:3 Personal Data Transferred From Business
to Business......................................330
4-4:4 Notice Contents..................................331
4-4:4.1 Data Categories........................332
4-4:4.2 Third Party Data Sharing...............334
4-4:4.2a Data Sharing in General.......334
4-4:4.2b Data Sharing Under
CalOPPA......................335
4-3:4.2c Data Sharing for Direct
Marketing Purposes...........337
4-4:4.3 Data Access, Update Process............342
4-4:4.4 Changes................................342
4-4:4.5 Effective Date.........................344
4-4:4.6 Response to Do Not Track Signals.......344
4-4:4.7 Cookies and Tracking Pixels............346
4- 4:4.8 Data Security..........................347
4-4:5 Style and Organ ization............................351
4- 4:6 Notice Placement..................................352
4-5 Privacy Notices for Callers...............................355
4-6 Privacy Notices for Employees.............................356
4-7 Opt-Out Notices for Direct Marketing Communications......360
4- 8 Other Privacy Policies and Notices........................360
Chapter 5: Drafting Other Privacy Documentation................361
5- 1 Chapter Overview..........................................361
5-2 Consent...................................................361
5- 2:1 When to Seek and Not to Seek Consent.............361
5-2:2 How to Obtain Valid Consent......................365
5-2:3 Opt-In, Out and In-Between.........................367
5- 2:3.1 Examples of Consent Mechanisms.........367
5-2:3.2 Minimum Requirements...................370
5-2:3.3 Selecting Implementation Options.......370
5-2:3,4 Silence as Consent.....................371
5-2:3.5 Affirmative, Express Consent...........371
5-2:4 Above and Beyond Opt-In Consent..................372
5-2:5 Other Considerations for Consent Drafting........374
xl CALIFORNIA PRIVACY LAW
Table of Contents
5-2:5.1 Incorporation of Notices Into
Consent Declarations...................374
5-2:5.2 Expressing Focused Consent............375
5-2:5.3 Placement of Consent Mechanism
and Declaration........................376
5- 2:5.4 Who Should Obtain Consent - Data
Controller or Processor?...............376
5-3 Agreements...............................................377
5-3:1 Agreements With Data Subjects Versus
Consent From Data Subjects......................378
5-3:2 Asking for an Express Acceptance of Website
Privacy Statements or General Privacy Notices..378
5-3:3 Agreements Instead of Consent.....................380
5-3:4 Commercial Agreements Between Companies...........381
5-3:5 Terms for Data Processing Services Agreements....382
5-3:6 Terms for Data Subprocessing Agreements...........383
5-3:7 Terms for Agreements Between Data Controllers....384
5-3:8 Terms Dictated by Laws and Compliance
Agendas.........................................385
5-4 Protocols................................................385
5- 4:1 Sample Direct Communications Protocol............387
5-5 Questionnaires and Data Submission Forms.................390
5- 6 Documenting Decisions and Compliance Efforts.............392
Chapter 6: Enforcement........................................395
6- 1 Chapter Overview........................................ 395
6-2 Enforcement of Privacy Laws
Through Private Civil Litigation........................397
6- 2:1 Causes of Action...........;.....................397
6- 2:1.1 Common Law............................397
6-2:1.2 Privacy Statutes......................403
6-2:1.3 Unfair Competition Law................405
6-2:2 Special Issues in Privacy Litigation .............412
6-2:2,1 Article III Standing..................412
6-2:2.2 Class Action Litigation...............420
6-2:3 Jurisdiction in Privacy Litigation................427
6-2:3.1 Subject Matter Jurisdiction...........427
6-2:3.2 Personal Jurisdiction.................427
6-3 Enforcement of Privacy Laws
by Government Agencies..................................431
6-3:1 Federal Trade Commission Enforcement Actions.....431
6-3:2 California Attorney General Enforcement Actions..436
CALIFORNIA PRIVACY LAW xli
Table of Contents
6-4 Enforcement of Privacy Laws
in Criminal Proceedings.................................442
6-4:1 Criminal Prosecution.............................442
6-4:2 Privacy for Criminal Defendants..................443
6-4:2.1 Suppression Remedy.....................444
6- 4:2.2 Statutory Remedy.......................445
6- 5 Enforcement against Online Service Providers.............445
6-5:1 Contributory Liability and Immunities
of Online Services Providers....................445
6- 5:2 Demands for Identity Information.................449
Chapter 7: Risk Mitigation....................................451
7- 1 Chapter Overview.........................................451
7-2 Compliance Program.......................................451
7- 2:1 Formal Program...................................451
7-2:2 Compliance Checklist.............................452
7- 2:2.1 Who Is in Charge of Data Privacy
and Security Compliance in the
Organization?..........................452
7-2:2.2 Are All Stakeholders Instructed and
Trained Regarding Their
Responsibilities? .....................453
7-2:2.3 Are You Doing Enough to Keep
Data Secure?...........................453
7-2:2.4 Have All Data Subjects Received
Appropriate Notices and Granted
Consent Where Required? Are All
Notice and Consent Forms Accurate
and Up-to-Date?........................454
7-2:2.5 Are Your Marketing Activities in
Compliance With Applicable Law?........454
7-2:2.6 Do You Design Products, Processes,
and Standard Contracts to Allow
or Facilitate Compliance With
Data Privacy and Security Requirements
by Your Employees, Customers, and
Product Users?.........................455
7-2:2.7 Are You Collecting or Retaining
More Data Than You Need?...............455
7-2:3 Maintenance......................................455
xlil CALIFORNIA PRIVACY LAW
Table of Contents
7-3 Due Diligence and Audits.....................................456
7-3:1 Due Diligence in M A Scénarios...................456
7-3:2 Due Diligence Questions to Ask........................458
7-3:3 Due Diligence Regarding Service
Providers and Vendors..............................459
7-4 Risk Mitigation Via Contracts................................459
7-5 Insurance....................................................460
Table of Cases.....................................................461
Index...............................................................477
CALIFORNIA PRIVACY LAW xliü
|
any_adam_object | 1 |
author | Determann, Lothar |
author_facet | Determann, Lothar |
author_role | aut |
author_sort | Determann, Lothar |
author_variant | l d ld |
building | Verbundindex |
bvnumber | BV044333986 |
classification_rvk | PZ 4900 |
ctrlnum | (OCoLC)1011375868 (DE-599)BVBBV044333986 |
discipline | Rechtswissenschaft |
edition | 2nd edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01202nam a2200301 c 4500</leader><controlfield tag="001">BV044333986</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171023 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170601s2017 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781628812046</subfield><subfield code="9">978-1-62881-204-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1011375868</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044333986</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4900</subfield><subfield code="0">(DE-625)141185:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Determann, Lothar</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">California privacy law</subfield><subfield code="b">practical guide and commentary : U.S. federal and state law</subfield><subfield code="c">Lothar Determann</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, California</subfield><subfield code="b">The Recorder</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XLIII, 502 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, eBook</subfield><subfield code="z">978-1-62881-205-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029737172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029737172</subfield></datafield></record></collection> |
id | DE-604.BV044333986 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:50:02Z |
institution | BVB |
isbn | 9781628812046 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029737172 |
oclc_num | 1011375868 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XLIII, 502 Seiten |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | The Recorder |
record_format | marc |
spelling | Determann, Lothar Verfasser aut California privacy law practical guide and commentary : U.S. federal and state law Lothar Determann 2nd edition San Francisco, California The Recorder 2017 XLIII, 502 Seiten txt rdacontent n rdamedia nc rdacarrier Erscheint auch als Online-Ausgabe, eBook 978-1-62881-205-3 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029737172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Determann, Lothar California privacy law practical guide and commentary : U.S. federal and state law |
title | California privacy law practical guide and commentary : U.S. federal and state law |
title_auth | California privacy law practical guide and commentary : U.S. federal and state law |
title_exact_search | California privacy law practical guide and commentary : U.S. federal and state law |
title_full | California privacy law practical guide and commentary : U.S. federal and state law Lothar Determann |
title_fullStr | California privacy law practical guide and commentary : U.S. federal and state law Lothar Determann |
title_full_unstemmed | California privacy law practical guide and commentary : U.S. federal and state law Lothar Determann |
title_short | California privacy law |
title_sort | california privacy law practical guide and commentary u s federal and state law |
title_sub | practical guide and commentary : U.S. federal and state law |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029737172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT determannlothar californiaprivacylawpracticalguideandcommentaryusfederalandstatelaw |