Show Less
You do not have access to this content

Determann’s Field Guide to Data Privacy Law

International Corporate Compliance, Third Edition

Lothar Determann

Companies, lawyers, privacy officers and marketing and IT professionals are increasingly facing privacy issues. While information is freely available, it can be difficult to grasp a problem quickly, without getting lost in details and advocacy. This is where Determann’s Field Guide to Data Privacy Law comes into its own – identifying key issues and providing concise practical guidance for an increasingly complex field shaped by rapid change in international laws, technology and society.
Show Summary Details
This content is available to you

Index

International Corporate Compliance, Third Edition

Lothar Determann

Access rights 0.35, 2.15, 3.29, 5.57
Access controls 1.38, 1.63, 5.12, 5.23, 5.52, Checklist
Access by employees in good faith 5.43
Access by governments 5.15, 5.34
Access as transfer 0.32, 0.33
Accountability 5.36
Advertising 3.08, 3.68, 3.78, 5.015.03, 5.53, 5.61, 5.63, 5.665.72
Ad Networks 3.26, 5.63
Ad Servers 5.64
Aggregate, aggregation 0.25, 5.76
Agreements 2.222.27, 2.342.37, 2.42, 3.663.73, 5.18, 5.23, 5.35
Alternative dispute resolution 2.62
Anonymous, anonymity 0.31, 5.31, 5.56, 5.59
APEC 2.722.73, Abbreviations
Article 29 Working Party 0.36, 1.14, 2.29, Resources, Abbreviations
Asia-Pacific Economic Cooperation 2.722.73, Abbreviations
Audits 1.34, 1.73, 3.20. 4.02, 5.08, 5.09, 5.22, 5.23, 5.52, 5.57, 5.73
Autonomous car 5.36
Background checks 5.26
Beacon 5.61
Best practices 3.04, 5.81
Big data 0.13, 5.36
Biometric data 5.75
Binding Corporate Rules 2.29, 2.322.45, 2.662.68, Checklist
Blocking statutes 5.34
Breach 0.17, 1.10, 1.61, 1.63, 2.38, 3.70, 4.03, 4.05, 5.13, 5.21, 5.23, 5.24, 5.33, 5.40, 5.435.49, 5.57, Checklist
Bring your own device (BYOD) 5.29
Browser settings 5.62
Business associate 0.34, 0.35, 1.45, 1.553.12, 3.73, 5.07, 5.23, 5.35, 5.40, 5.73
BYOD 5.29
Canadian anti-spam legislation (CASL) 5.66
CAPTCHA 5.36, Abbreviations
CBPR 2.722.73
Certifications 2.72, Abbreviations
CFAA, 5.32, 5.36, Abbreviations
Changing privacy policies, notices 3.22, 3.32, 3.42, 3.56, 3.67
Checklists 0.03, 2.57, 5.35, Checklist
Chief Privacy Officer 1.11, 1.14, 1.231.24, 1.26, 2.63, 3.88, Checklist
Cloud Computing 0.13, 0.15, 1.06, 2.27, 3.20, 5.055.23, 5.345.35, 5.57
Codes of Conduct 2.322.33, 2.352.37, 2.41, 2.43
Cold calls 5.665.67
Colocation provider 0.35
Common Market 1.51
Communications Decency Act (CDA) 5.58, Abbreviations
Computer fraud 5.32, 5.36
Computer interference laws 5.32, 5.36
Consent 2.20, 2.24, 3.353.69
Contracts 2.212.45, 2.482.58, 3.663.73, 5.18, 5.23
Control 0.340.35, 5.10, 5.20
Contributory liability 3.77, 5.55–5.56
Cookies 3.24, 3.35, 3.43, 5.04, 5.42, 5.60, 5.61
COPPA 5.42, Abbreviations
Covered entities 1.45, 1.55, 3.73, 5.35, 5.73
Cross-Border Privacy Rules (CBPR) 2.722.73, Abbreviations
Crawlers 5.36
Cybersecurity 5.36
Data brokers 5.36
Data controller 0.09, 0.34, 0.35
Data handler 0.35
Data integrity 2.07, 3.79, 5.13, 5.28
Data processor 0.10, 0.330.35, 1.46, 2.06, 2.08, 2.10, 2.242.25, 2.27, 2.37, 2.50, 2.52, 3.20, 3.693.71, 3.84, 5.065.07, 5.10, 5.175.20, 5.23, 5.35, 5.43
Data privacy law 0.12, 0.140.21, 0.320.33, 1.431.56
Data protection authority 0.360.37, 2.35, 3.30, 5.18
Data protection law 0.15, 1.17, 1.20, 1.60, 2.01, 2.52, 2.72, 3.69, 5.17
Data protection officer 0.20, 0.37, 1.121.26, 5.34
Data retention 5.24
Data room 4.07
Data security breach notification 0.17, 1.61
Data transfer agreements 2.22, 2.24, 2.342.35, 2.42, 2.442.45, 2.542.55, 3.82, 3.84, 5.07, 5.57
Digital rights management (DRM) 5.65
Discovery 2.37, 5.34, 5.81
DMCA 5.36
DNT 5.62
Documentation 3.013.88
Do not call list 5.66
Do not track (DNT) 5.62
Double opt-in 3.52, 5.69
Drafting 3.013.88
DRM 5.65
Due diligence 2.35, 3.15, 3.80, 4.03, 4.05, 4.07, 4.094.10, 5.07, 5.23, 5.73, Checklist
Employees 5.265.32
Encryption 0.17, 0.25, 1.27, 1.38, 1.63, 3.74, 4.07, 5.33, 5.45
Enforcement 1.01, 1.391.40, 1.52, 1.54, 1.59, 2.35, 2.372.39, 3.26, 3.73, 5.15, 5.24, 5.36, 5.39, 5.41, 5.485.49, 5.57, 5.66, 5.755.76, 5.79
EU Data Protection Directive 0.190.20, 0.36, 2.15, Abbreviations
EU General Data Protection Regulation 0.20, 0.36, 1.121.14, 1.181.19, 1.221.51, 2.15, 2.332.36, 3.30, 3.803.83, 5.04, 5.38, 5.415.42, 5.445.57, Resources, Abbreviations
EU-U.S. Privacy Shield 2.132.14, 2.172.18, 2.25, 2.30, 2.332.45, 2.56, 2.592.61, 2.71, 3.15, 3.173.23, 3.803.81, 4.01, 5.04, 5.175.18, 5.39, Resources
Export control compliance 0.29
Facial recognition 5.36, 5.65, 5.75
Fair Credit Reporting Act 3.50, Abbreviations
FCRA 3.50, Abbreviations
Filtering 5.29, 5.74
Financial data 1.45, 5.33
Fingerprints 5.755.76
FOIPPA 5.15
Forgotten, right to be 5.25
Genetic information 5.76
General Data Protection Regulation 0.20, 0.36, 1.121.14, 1.181.19, 1.22, 1.51, 2.15, 2.332.36, 3.30, 3.803.83, 5.04, 5.38, 5.415.42, 5.44, 5.57, Resources, Abbreviations
Good faith access 5.43
Government information request 5.34
Government filing 0.33, 1.55, 1.67, 2.07, 3.18, 4.09
Gramm–Leach–Bliley Act (GLB) 1.55, 3.19, 5.33, 5.35, Abbreviations
Health information 1.55, 3.27, 3.35, 5.15, 5.23, 5.35, 5.82
Hessen 0.15
Household 0.24, 1.45, 5.58
HIPAA 0.17, 1.24, 1.45, 1.55, 3.12, 3.19, 3.35, 3.50, 3.73, 5.07, 5.23, 5.35, 5.40, 5.73, 5.76, Resources
Human Resources Information Systems (HRIS) 3.19, 3.38, 5.15, 5.21, 5.28, Checklist
Hotline 3.19, 3.84, 5.26, 5.31, 5.56
Internet of everything 5.36
Internet of things 5.36, 5.65
Interoperability 1.54, 2.13, 2.42, 2.72, 5.06
Investigations 0.29, 1.05, 1.63, 2.37, 3.17, 4.10, 5.26, 5.30, 5.34, 5.48, 5.76
IP address 0.24, 5.56, 5.61, 5.82
ISO certification Abbreviations
Jurisdiction 5.665.67, 5.69
Key concepts 0.140.38
Key Terms 0.050.13
Lawful access by governments 5.15, 5.34
Legitimate interest exception 0.20, 1.54, 2.10, 3.30, 3.35, 5.28, 5.36, 5.75
Litigation hold 5.24, 5.29
Location data 3.28, 3.59, 5.41
M&A, mergers and acquisitions 4.01, 4.03, 4.054.07
Machine-to-machine (M2M) 5.36, 5.65
Maintenance 4.014.02
Making available transfer 0.32
Marketing fluff in privacy policies 3.04, 3.17, 3.33, 5.57
Mere conduit 0.35, 5.35
Minors 5.42
Mobile 3.593.60, 5.41, 5.61
Model Clauses (a.k.a Standard Contractual Clauses) 2.222.29, 2.322.44, 2.492.54, 2.71, 3.73, 5.04, 5.18, 5.23
Monitoring 0.37, 1.221.24, 5.2632
Multi-tenant 5.13, 5.22
National Security Agency (NSA) 0.37, 2.16, 5.15, 5.36, Abbreviations
Networking 0.150.16, 3.24, 3.68, 5.58
Notices 3.183.32, 5.495.51
Notifications to data protection authorities 1.20, 1.84, 5.49
NSA 0.37, 2.16, 5.15, 5.36, Abbreviations
Onward transfer 2.13, 2.15, 2.32, 2.37, 2.58, 3.84, 5.07
Opt-in 3.59, 3.78, 5.04, 5.56, 5.69
Opt-out 2.32, 4.03, 5.02, 5.04, 5.605.61, 5.66, 5.685.72
Outsourcing 2.33, 2.40, 3.07, 3.38, 5.09, 5.15, 5.23
Ownership 5.53
Pareto Principle, 80–20 rule 1.37
Patriot Act 2.16, 5.15, Abbreviations
Payment Card Industry (PCI) 5.23, 5.33, 5.40
PCI Standards 5.23, 5.33, 5.40
Permissions 3.12
Personal data 2.572.58, 2.702.71, 3.11, 3.19, 3.30, 3.43, 3.723.73, 5.085.09, 5.11, 5.18, 5.23
Personal use 5.29, 5.32
Platform 0.16, 2.27, 3.593.60, 3.68, 5.05, 5.20, 5.32, 5.58, 5.66
Privacy by design 3.60, 5.54
Privacy Officer 0.01, 1.11, 1.14, 1.231.241.261.27, 3.12, 5.39, Checklist
Privacy policy 2.47, 3.17
Privacy Shield 5.04
Privacyville 3.59
Private cloud 5.13
Private household use 1.45, 5.58
Protocol 3.05, 3.13, 3.74
Questionnaires 3.14, 3.13, 3.17, 3.743.75, 5.45, 5.52
Records of data processing activities 1.33
Redacted 0.25, 4.08
Remedies 3.63, 5.57
Retention 3.28, 5.24
RFID 3.24, 5.29, 5.41
Rights and remedies 2.54, 5.57
Right to be forgotten 5.25
Robots 5.38
Safe Harbor 2.142.15, 2.25, 2.28, 2.392.40, 2.57, 2.71, 5.04
SCC (a.k.a ‘Model Clauses’) 2.222.29, 2.322.44, 2.492.54, 2.71, 3.73, 5.04, 5.18, 5.23
Scraping 5.36
Search engine 5.36, Resources
Secondment 2.10, 2.21, 5.28
Self-assessment 2.13, 2.35, 2.42, 2.57, 2.65, 3.15, 5.52
Sensitive data 0.06, 0.20, 0.270.29, 1.15, 1.62, 5.31, 5.41, 5.76
Service Providers 0.10, 0.330.35, 1.17, 1.45, 2.08, 2.25, 2.33, 2.37, 2.40, 2.44, 3.20, 3.263.28, 3.65, 4.094.10, 5.01, 5.065.10, 5.145.23, 5.35
Smartphones 3.60
SOC 5.23
Social media 3.59, 5.32, 5.58
Social media passwords 5.32, 5.58
Social networking 0.15, 0.16, 3.24, 3.68, 5.58
Song-Beverly Credit Card Act 1.55, 3.35
Spam 1.45, 3.78, 5.01, 5.29, 5.32, 5.56, 5.66
Spam filtering 5.29, 5.66
Spiders 5.36
SSAE 16 5.23, Abbreviations
Standard Contractual Clauses, SCC (a.k.a ‘Model Clauses’) 2.222.29, 2.322.44, 2.492.54, 2.71, 3.73, 5.04, 5.18, 5.23
Subprocessor 2.24, 2.52
Tags 3.24, 5.29, 5.41, 5.61, 5.65
Task list 1.271.68
Telematics 5.65
Tracking 3.19, 3.24, 3.34, 3.65, 3.68, 5.025.29, 5.41, 5.605.65
Trade compliance screening 0.29
Transfer 0.32, 0.35, 2.01–2.81
Unsolicited calls, emails 5.665.72
Updating notices, privacy policies 3.22, 3.32, 3.42, 3.56, 3.67
USA Patriot Act 5.15, Abbreviations
Vendors 4.094.10, 5.13, 5.205.21, 5.51, 5.73
Virus filtering 5.76
Web crawler 5.36
Whistleblower hotlines 3.19, 3.84, 5.26, 5.31, 5.56
Wiretapping 5.74
Why protect privacy? 5.775.81
X-rays 5.75
ZIP Codes 5.82, Abbreviations