CIPP / US Book - Part 2 Flashcards
Is there a private right of action available in telemarketing?
The tort of “intrusion on seclusion” imposes liability on “one who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns
To succeed in an intrusion on seclusion tort claim, the plaintiff must show that
With regard to a defendant who is a person, the intrusion would be highly offensive to a reasonable person. In contrast with intrusion tort requirements, telemarketing regulations in the United States address milder intrusions, which do not require a showing of “highly offensive” intrusion.
Who was the Telephone Consumer Protection Act of 1991 (TCPA) issued by?
The FCC issued regulations under the Telephone Consumer Protection Act of 1991 (TCPA)
Telephone Consumer Protection Act of 1991 (TCPA)
- Place restrictions on unsolicited advertising by telephone and facsimile, and updated them in 2012 to address robocalls
- The FCC has determined that these prohibitions encompass text messages
Who was the Telemarketing Sales Rule (TSR) issued by?
The FTC first issued its Telemarketing Sales Rule (TSR) in 1995, implementing the Telemarketing and Consumer Fraud and Abuse Prevention Act
How is telemarketing defined under the Telemarketing Sales Rule (TSR)?
A plan, program, or campaign which is conducted to induce the purchase of goods or services or a charitable contribution, by use of one or more telephones and which involves more than one interstate telephone call
Who enforces the Do Not Call (DNC) Registry?
The FTC, the FCC and state attorneys general enforce the DNC Registry, which now contains over 220 million participating phone numbers—and is still growing
Consequences for violating DNC Registry?
Violations of the rule can lead to civil penalties of up to $40,654 per violation. In addition, violators may be subject to nationwide injunctions that prohibit certain conduct and may be required to pay redress to injured consumers
How often do sellers and telemarketers have to update their call lists?
every 31 days
How is the DNC registry accessed?
The registry is accessed via an automated website at www.telemarketing.donotcall.gov. Only sellers, telemarketers and their service providers may access the registry
How is the DNC registry accessed for sellers?
Each seller must establish a profile by providing identifying information about the organization. The seller then receives a unique Subscription Account Number (SAN) upon payment of the appropriate fee
How is the DNC registry accessed for telemarketers?
Telemarketers accessing the registry on behalf of seller-clients are required to identify the seller-clients and provide the seller-client’s unique SAN. (Telemarketers access the registry, at no cost, through the use of their seller-client’s unique SANs. Their access is limited to the area codes requested and paid for by the seller-client.)
What is considered a violation of the DNC registry?
It is a violation of the TSR to place any call to a consumer (absent an exception) unless the registry is checked. In other words, even a call to a consumer whose phone number is not on the registry is a violation of the TSR if the registry was not checked prior to the call
DNC rules do not apply to:
- Nonprofits calling on their own behalf
- Calls to customers with an existing relationship within the last 18 months
- Inbound calls, provided that there is no “upsell” of additional products or services
- Most business-to-business calls
Existing Business Relationship Exception
Sellers (and telemarketers calling on their behalf) may call a consumer with whom a seller has an established business relationship (EBR), provided the consumer has not asked to be on the seller’s entity-specific DNC list
What is required for an existing business relationship exception?
- An EBR exists w/ a customer if the consumer has purchased, rented or leased the seller’s goods or services (or completed a financial transaction with the seller) within 18 months preceding a telemarketing call.
- The 18-month period runs from the date of the last payment, transaction or shipment between the consumer and the seller. - An EBR exists with a prospect if the consumer has made an application or inquiry regarding the seller’s goods and services. This EBR runs for 3 months from the date of the person’s inquiry or application
TSR: Exception Based on Consent
What are the requirements for consent?
The TSR allows sellers and telemarketers to call consumers who consent to receive such calls. This consent must be in writing, must state the number to which calls may be made and must include the consumer’s signature. (A valid electronic signature is acceptable.)
TSR: what is required for a seller or telemarketer to meet the consent requirements?
- The seller’s request for consent must be “clear and conspicuous.”
- If in writing, the request “cannot be hidden; printed in small, pale, or noncontrasting type; hidden on the back or bottom of the document; or buried in unrelated information where a person would not expect to find such a request.”
- If online, the “please call me” button may not be prechecked
The Do Not Call Safe Harbor
- The TSR has a “DNC Safe Harbor” that sellers and telemarketers can use to reduce the risk of liability
- This DNC Safe Harbor provides an important protection for sellers and telemarketers because violations of the TSR can result in civil penalties, as of the writing of this book, of up to $40,654 per call
What are the requirements for the Do Not Call Safe Harbor?
- Seller or telemarketer has established and implemented written procedures to honor consumers’ requests that they not be called
- Seller or telemarketer has trained its personnel, and any entity assisting in its compliance, in these procedures
- Seller, telemarketer, or someone else acting on behalf of the seller . . . has maintained and recorded an entity-specific Do Not Call list,
- Seller or telemarketer uses, and maintains records documenting, a process to prevent calls to any telephone number on an entity-specific Do Not Call list or the - National Do Not Call Registry. This, provided that the latter process involves using a version of the National Registry from the FTC no more than 31 days before the date any call is made
- Seller, telemarketer, or someone else acting on behalf of the seller. . . monitors and enforces compliance with the entity’s written Do Not Call procedures, [then]
The call is a result of error
The TSR requires covered organizations to:
R DISC RCDC
- Retain records for at least 24 hours
- Display caller ID information
- Identify themselves and what they are selling
- Screen and scrub names against the national DNC list
- Call only between 8 a.m. and 9 p.m.
- Respect requests to call back
- Comply with special rules for automated dialers
- Disclose all material information and terms
- Comply with special rules for prizes and promotions
TSR and preemption
Neither the TSR nor the FCC rules preempt state law. As the FTC notes, compliance is required both of “telemarketers,” entities that initiate or receive telephone calls to or from consumers, and “sellers,” the entities that provide or arrange to provide the goods and services being offered
Entity-Specific Suppression Lists
- TSR prohibits any seller (or telemarketer calling on the seller’s behalf) from calling any consumer who has asked not to be called again. Sellers and telemarketers are required to maintain internal suppression lists to respect these DNC requests
- TSR does provide some latitude for companies that have distinct corporate divisions. In general, such divisions are considered separate sellers under the rule
The FTC specifies two factors that should be used to determine whether DNC requests should be shared among divisions:
(1) whether there is substantial diversity between the operational structure of the divisions and
(2) whether the goods or services sold by the divisions are substantially different from each other
- If a consumer tells one division of a company not to call again, a distinct corporate division of the same company may still make calls to that consumer
The TSR requires that, at the beginning of the call, before delivering any sales content, telemarketers disclose:
(1) The identity of the seller
(2) That the purpose of the call is to sell goods or services (must be honest»_space; name all purposes)
(3) The nature of those goods or services
(4) In the case of a prize promotion, that no purchase or payment is necessary to participate or win, and that a purchase or payment does not increase the chances of winning
TSR: Misrepresentations and Material Omissions
- TSR prohibits misrepresentations during the sales call. Telemarketers must provide accurate and complete information about the products and services being offered.
- They may not omit any material facts about the products or services
There are ten broad categories of information that must always be disclosed:
CRAMP CNDM
- Cost and quantity
- Refund, repurchase or cancellation policies
- Affiliations, endorsements, or sponsorships
- Material restrictions, limitations, or conditions
- Performance, efficacy, or central characteristics
- Credit card loss protection
- Negative option features
- Debt relief services
- Material aspects of prize promotions and investment opportunities
TSR: Transmission of Caller ID Information
TSR requires entities that make telemarketing calls to transmit accurate call identification information so that it can be presented to consumers with caller ID services
TSR: Transmission of Caller ID Information - substitution
Each telemarketer may transmit its own name and phone number, or it may substitute the name of the seller on whose behalf the telemarketer is making the call. The telemarketer may also substitute the seller’s customer-service telephone number for its number, provided that the seller’s number is answered during normal business hours
TSR: Transmission of Caller ID Information - what if the called ID information does not reach the consumer?
- Telemarketers are not liable if, for some reason, caller ID information does not reach a consumer, provided that the telemarketer has arranged with its carrier to transmit this information in every call
- The FTC guidance states that “telemarketers who can show that they took all available steps to ensure transmission of Caller ID information in every call will not be liable for isolated inadvertent instances when the Caller ID information fails to make it to the consumer’s receiver
TSR: Prohibition on Call Abandonment
- TSR expressly prohibits telemarketers from abandoning an outbound telephone call with either “hang-ups” or “dead air.”
- Under the TSR, an outbound telephone call is “abandoned” if a person answers it and the telemarketer does not connect the call to a live sales representative within two seconds of the person’s completed greeting
TSR: Prerecorded messages
The use of prerecorded-message telemarketing, where a sales pitch begins with or is made entirely by a prerecorded message, also violates the TSR because the telemarketer is not connecting the call to a live sales representative within 2 seconds of the called person’s completed greeting
TSR: when are prerecorded messages allowed?
For a company to use prerecorded sales messages, it must have the prior express consent (opt-in) of the consumer
TSR: Abandonment Safe Harbor
According to the FTC guidance, the abandoned call Safe Harbor provides that a telemarketer will not face enforcement action for violating the call abandonment prohibition if the telemarketer:
(1) Uses technology that ensures abandonment of no more than 3 percent of all calls answered by a live person, measured per day per calling campaign
(2) Allows the telephone to ring for 15 seconds or four rings before disconnecting an unanswered call
(3) Plays a recorded message stating the name and telephone number of the seller on whose behalf the call was placed whenever a live sales representative is unavailable within two seconds of a live person answering the call
(4) Maintains records documenting adherence to the preceding three requirements
TSR: To take advantage of the Safe Harbor, a telemarketer must first ensure that a live representative takes ______
To take advantage of the Safe Harbor, a telemarketer must first ensure that a live representative takes at least 97 percent of the calls answered by consumers
TSR: Under the safe harbor rule, how long must a telemarketer let the phone ring?
The Safe Harbor also requires the telemarketer to let the phone ring at least four times (or for 15 seconds). This requirement is designed to ensure that consumers have sufficient time to answer a call.
For the small number of calls that are abandoned, the TSR’s Safe Harbor requires the telemarketer to play a ________, consisting of the company’s name and phone number and a statement that the call was for telemarketing purposes. This recorded message may not contain ______
For the small number of calls that are abandoned, the TSR’s Safe Harbor requires the telemarketer to play a recorded greeting, consisting of the company’s name and phone number and a statement that the call was for telemarketing purposes. This recorded message may not contain a sales pitch
TSR: Under the safe harbor rule, must telemarketers keep the recordings of calls?
Yes, telemarketers must keep records that demonstrate its compliance with the other Safe Harbor provisions
The records must demonstrate both that the per-day, per-campaign abandonment rate has not exceeded three percent and that the ring time and recorded message requirements have been met
TSR: If preacquired account information is used in connection with a free-to-pay conversion offer, the telemarketer must:
- Obtain from the customer at least the last four digits of the account number to be charged
- Obtain the customer’s express agreement to be charged for the goods or services using the account number for which the customer has provided at least the last four digits
- Make and maintain an audio recording of the entire telemarketing transaction
In 2012, the FCC revised its Telephone Consumer Protection Act (TCPA) rules governing prerecorded calls (robocalls) and the use of automatic telephone dialing systems (autodialers) to reconcile its rules with the ______
In 2012, the FCC revised its Telephone Consumer Protection Act (TCPA) rules governing prerecorded calls (robocalls) and the use of automatic telephone dialing systems (autodialers) to reconcile its rules with the TSR
Business relationship exemption with respect to robocalls - can it end?
- Now, even if a company has an established business relationship with a consumer, it is required to receive “prior express written consent” for all robocalls to residential lines.
- Second, the rules include a provision that allows consumers to “opt out of future robocalls during a robocall.”
The call abandonment rate for robocalls requirements
In addition, the revisions increase harmonization with the FTC’s rules to require “assessment of the call abandonment rate to occur during a single calling campaign over a 30-day period, and if the single calling campaign exceeds a 30-day period, we require that the abandonment rate be calculated each successive 30-day period or portion thereof during which the calling campaign continues
Robocalls to residential lines made by healthcare-related entities governed by HIPAA
are exempt from the above requirements
Robocalls vs. robotexts sent
- FCC issued an order explicitly stating that text messages sent to wireless devices are subject to the same consumer protections as voice calls under the TCPA.
- This means that the TCPA prohibits companies from sending text messages via equipment that sends the messages without human intervention, known as “robotexts”—absent express consent
FCC’s guidance on robotexts include:
(1) consent can be revoked by the consumer at any time by any reasonable means,
(2) the mere fact that a consumer’s wireless number appears in the contact list of another wireless customer is not sufficient to establish consent and
(3) when a caller has consent for a wireless number and the number has been reassigned, the caller is not liable for the first call but will be liable for subsequent calls if the new consumer makes the caller aware of the change
TSR: record-keeping requirements
In general, the following records must be maintained for 2 years from the date that the record is produced:
- Advertising and promotional materials
- Information about prize recipients
- Sales records
- Employee records
- All verifiable authorizations or records of express informed consent or express agreement
TSR: record-keeping requirements for sales records
Sales records must include:
(1) the name and last known address of each customer,
(2) the goods or services purchased,
(3) the date the goods or services were shipped or provided and
(4) the amount the customer paid for the goods or services
TSR: record-keeping requirements for all former and current employees involved in telephone sales
(1) the name (and any fictitious name used),
(2) the last known home address and telephone number and
(3) the job title(s) of each employee.
- Additionally, if fictitious names are used by employees, the TSR also requires that each fictitious name be traceable to a specific employee
Consequences for violations of the TSR
Violations of the TSR are currently punishable by civil penalties of up to $40,654 per call. The FCC and state attorneys general also actively enforce their counterpart regulations. Additionally, some states have their own versions of telemarketing sales rules that carry additional penalties and may have different requirements
Fax marketing
- Who was it enforced by?
- What does it require?
TCPA, enforced by the FCC, prohibits unsolicited commercial fax transmissions
Consequences for violating fax marketing rules?
Penalties include a private right of action and statutory damages of up to $500 per fax
Origin of Junk Fax Prevention Act (JFPA)
In 2005, Congress passed the Junk Fax Prevention Act (JFPA) in part to clarify whether consent was required for commercial faxing
Junk Fax Prevention Act (JFPA)
Provides that consent can be inferred from an EBR, and it permits sending of commercial faxes to recipients based on an EBR, as long as the sender offers an opt-out in accordance with the act
Some states have enacted their own laws regulating unsolicited commercial fax transmissions, such as
Notably, California attempted to eliminate the TCPA’s EBR exception with legislation applicable to unsolicited faxes sent to or from a fax machine located within the state. The law, however, was declared unconstitutional when applied to interstate fax transmissions due to the TCPA’s preemption of interstate regulation
What does the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act cover?
The law covers the transmission of commercial email messages whose primary purpose is advertising or promoting a product or service
Who does the CAN-SPAM Act apply to?
The act applies to anyone who advertises products or services by electronic mail directed to or originating from the United States
Why was the CAN-SPAM Act created?
CAN-SPAM was never intended to eliminate all unsolicited commercial email, but rather to provide a mechanism for legitimate companies to send emails to prospects and respect individual rights to opt-out of unwanted communications
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act
A law that created the rules of the road for how legitimate organizations send emails, including clear identification of the sender and a simple unsubscribe or opt-out
CAN-SPAM Act requires
- Requires commercial emails to contain a functioning, clearly and conspicuously displayed return email address that allows the recipient to contact the sender
- Requires all commercial emails to include clear and conspicuous notice of the opportunity to opt-out along with a cost-free mechanism for exercising the opt-out, such as by return email or by clicking on an opt-out link
- Requires all commercial email to include (1) clear and conspicuous identification that the message is a commercial message (unless the recipient has provided prior affirmative consent to receive the email) and (2) a valid physical postal address of the sender (which can be a post office box)
- Requires all commercial email containing sexually oriented material to include a warning label (unless the recipient has provided prior affirmative consent to receive the email)
CAN-SPAM Act prohibits
- Prohibits false or misleading headers
- Prohibits deceptive subject lines
- Prohibits sending commercial email (following a grace period of 10 business days) to an individual who has asked not to receive future email
- Prohibits “aggravated violations” relating to commercial emails such as (1) address-harvesting and dictionary attacks, (2) the automated creation of multiple email accounts and (3) the retransmission of commercial email through unauthorized accounts
Consequences for violating the CAN-SPAM Act?
CAN-SPAM is enforced primarily by the FTC and carries penalties of fines of up to $40,654 per violation.
- In addition, deceptive commercial email is subject to laws banning false or misleading advertising
- FTC has the authority to issue regulations implementing the CAN-SPAM Act and did so in 2008 to clarify a number of statutory definitions
CAN-SPAM distinguishes commercial email messages from “transactional or relationship messages,” which are
messages whose primary purpose is to:
- Facilitate or confirm an agreed-upon commercial transaction
- Provide warranty or safety information about a product purchased or used by the recipient
- Provide certain information regarding an ongoing commercial relationship
- Provide information related to employment or a related benefit plan
- Deliver goods or services to which the recipient is entitled under the terms of an agreed-upon transaction
How did the CAN-SPAM Act change the “from” in the subject line?
The FTC issued a regulation in 2008 clarifying that the entity identified in the “from” line can generally be considered the single sender as long as there is compliance with the other provisions of CAN-SPAM
CAN -SPAM was amended in 2008 providing more clarity - what did it clarify?
(1) the “from” in the subject line
(2) a prohibition on having the email recipient pay a fee to opt-out,
(2) the definition of “valid physical postal address” and
(3) the application of the term person to apply beyond natural persons
CAN-SPAM grants enforcement authority to the
FTC and other federal regulators, along with state attorneys general and other state officials
CAN-SPAM: Can internet service providers that have been adversely affected by a violation sue?
- Yes, Violators for injunctive relief and monetary damages
- Unlike some state spam laws that are now preempted, the act does not provide for a right of action for other parties
- For those authorized to sue, the act provides for injunctive relief and damages up to $250 per violation, with a maximum award of $2 million
CAN-SPAM: For those authorized to sue, the act provides for injunctive relief and damages up to
For those authorized to sue, the act provides for injunctive relief and damages up to $250 per violation, with a maximum award of $2 million. The act further provides that a court may increase a damage award up to three times the amount otherwise available in cases of willful or aggravated violations. Certain egregious conduct is punishable by up to five years imprisonment
3FN Case
A federal judge shut down a company called 3FN based on the FTC’s allegations that it had knowingly distributed spam and malware as well as hosted illegal content, such as child pornography
CAN-SPAM and preemption
- CAN-SPAM preempts most state laws that restrict email communications
- Although state spam laws are not superseded by CAN-SPAM to the extent such laws prohibit false or deceptive activity
The CAN-SPAM Act defines an MSCM
- Mobile service commercial messages (MSCMs): “a commercial electronic mail message that is transmitted directly to a wireless device that is utilized by a subscriber of a commercial mobile service.”
- The message must have (or utilize) a unique electronic address that includes “a reference to an Internet domain.”
The CAN-SPAM Act and the FTC
The FCC rule defers to the FTC rules and interpretation regarding the definitions of “commercial” and “transactional” (with respect to the mail messages) as well as the mechanisms for determining the “primary purpose” of messages. Accordingly, the FCC rule must be analyzed in the context of the FTC regulatory framework for the CAN-SPAM Act
CAN-SPAM: Express Prior Authorization
The CAN-SPAM Act prohibits senders from sending any MSCMs without the subscriber’s “express prior authorization”
CAN-SPAM: MSCMS - Express Prior Authorization requirements
- Express prior authorization must be “express”»_space; consumer has taken an affirmative action to give “the entity that is being authorized to send the MSCMs.
- FCC rule prohibits any sender from sending MSCMs on behalf of other third parties, including affiliates and marketing partners - Authorization may be obtained in any format, oral or written, including electronic
- FCC requires that each sender of MSCMs must document authorization and be able to demonstrate that a valid authorization (meeting all the other requirements) existed prior to sending the commercial message.
- The burden of proof rests w/ the sender - With regard to revocations, senders must enable consumers to revoke authorizations using the same means the consumers used to grant authorizations. (Ex./ if a consumer authorizes MSCMs electronically, the company must permit the consumer to revoke the authorization electronically.)
- MSCMs themselves must include functioning return email addresses or another Internet-based mechanism that is clearly and conspicuously displayed for the purpose of receiving opt-out requests.
- Consumers must not be required to view or hear any further commercial content during the opt-out process (other than institutional identification). - The FCC rule maintains the CAN-SPAM–mandated 10-business-day grace period following a revoked authorization, after which messages cannot be sent.
Purpose of the Wireless Domain Registry
To help senders of commercial messages determine whether those messages might be MSCMs (rather than regular commercial email), the FCC has created a registry of wireless domain names (available on the FCC website). It is updated on a periodic basis, as new domains are added
Wireless Domain Registry requirements: senders are responsible . . .
Senders are responsible for obtaining this list and ensuring that the appropriate authorizations exist before sending commercial messages to addresses within the domains
What is not covered under the Wireless Domain Registry?
According to the FCC guidance, messages that are not sent to an address for a wireless device, but are only forwarded to a wireless device, are not subject to FCC rules on MSCMs
Wireless Domain Registry: How often are the providers required to update the registry?
The providers are also responsible for updating information on the domain name list to the FCC within 30 days before issuing any new or modified domain names.
Telecommunications Act of 1996
The statute imposed new restrictions on the access, use and disclosure of customer proprietary network information (CPNI)
Telecommunications Act, Section 222
Section 222 of the act governs the privacy of customer information provided to and obtained by telecommunications carriers. Prior to the act, carriers were permitted to sell customer data to third-party marketers without consumer consent
Customer proprietary network information (CPNI) - what does it cover?
CPNI is information collected by telecommunications carriers related to their subscribers. This includes subscription information, services used, and network and billing information as well as phone features and capabilities. It also includes call log data such as time, date, destination and duration of calls. Certain PI such as name, telephone number and address is not considered CPNI
Who do CPNI requirements apply to?
Telecommunications carriers and voice-over-Internet protocol (VoIP) providers that are interconnected with telephone service
Customer proprietary network information (CPNI) requirements for carriers
- The Act imposes requirements on carriers to limit access, use and disclosure of CPNI. Specifically, carriers can use and disclose CPNI only with customer approval or “as required by law.”
- However, carriers do not need approval to use, disclose or provide marketing offerings among service categories that customers already subscribe to
- Carriers can also use CPNI for billing and collections, fraud prevention, customer service and emergency services
U.S. West, Inc. v. Federal Communications Commission
The Tenth Circuit found that the opt-in requirement violated the First Amendment speech rights of the carriers. Thus, the standard shifted to an opt-out system for carriers’ own use of CPNI
The 2007 CPNI order requires customers to
The 2007 CPNI order requires customers to expressly consent, or opt in, before carriers can share their CPNI with joint venture partners and independent contractors for marketing purposes
The 2007 CPNI order requires carriers and customers to
1st. Carriers must notify law enforcement when CPNI is disclosed in a security breach within seven business days of that breach
2nd. Customers must provide a password before they can access their CPNI via telephone or online account services
Cable Communications Policy of 1984
The Cable Communications Policy of 1984 regulates the notice a cable television provider must furnish to customers, the ability of cable providers to collect PI, the ability of cable providers to disseminate PI and the retention and destruction of PI by cable television providers
Does the Cable Communications Policy of 1984 provide a private right of action or compensation?
The Act provides a private right of action for violations of the aforementioned provisions, and allows for actual or statutory damages, punitive damages and reasonable attorney’s fees and court costs
What does the Cable Communications Policy of 1984 cover or lack thereof?
The act does not regulate the provision of broadband Internet services via cable because the act defines a “cable service” as “one-way transmission to subscribers of . . . video programming or . . . other programming service, and . . . subscriber interaction, if any, which is required for the selection or use of such video programming or other programming service
At the time of entering into an agreement to provide cable services, and on an annual basis thereafter, cable service providers are required to
give subscribers a privacy notice that “clearly and conspicuously” informs subscribers of: (1) the nature of the PI collected, (2) how such information will be used, (3) the retention period of such information and (4) the manner by which a subscriber can access and correct such information
The Cable Communications Policy limits cable service providers’ right to disseminate PI without
The “written or electronic consent” of the subscriber, unless the disclosure is subject to a specified exception
The Cable Communications Policy disclosure exceptions
Disclosures may be made:
(1) to the extent necessary to render services or conduct other legitimate business activities,
(2) subject to a court order with notice to the subscriber or
(3) if the disclosure is limited to names and addresses and the subscriber is given an option to opt-out
Who does the Video Privacy Protection Act of 1988 (VPPA) apply to?
The act applies to “video tape service providers,” who are defined as anyone “engaged in the business, in or affecting interstate or foreign commerce, of rental, sale, or delivery of prerecorded video cassette tapes or similar audio visual materials” as well as individuals who receive PI in the ordinary course of a videotape service provider’s business or for marketing purposes
Who does the Video Privacy Protection Act of 1988 (VPPA) apply to?
The act applies to “video tape service providers,” who are defined as anyone “engaged in the business, in or affecting interstate or foreign commerce, of rental, sale, or delivery of prerecorded video cassette tapes or similar audio visual materials” as well as individuals who receive PI in the ordinary course of a videotape service provider’s business or for marketing purposes
Video Privacy Protection Act of 1988 (VPPA): requirements for video service providers?
Videotape service providers are prohibited from disclosing customer PI unless an enumerated exception applies
Video Privacy Protection Act of 1988 (VPPA): exceptions to the requirements for video service providers
(1) is made to the consumer themselves;
(2) is made subject to the contemporaneous written consent of the consumer;
(3) is made to law enforcement pursuant to a warrant, subpoena or other court order;
(4) includes only the names and addresses of consumers;
(5) includes only names, addresses and subject matter descriptions and the disclosure is used only for the marketing of goods or services to the consumers;
(6) is for order fulfillment, request processing, transfer of ownership or debt collection; or
(7) is pursuant to a court order in a civil proceeding and the consumer is granted a right to object
Video Privacy Protection Act of 1988 (VPPA): disposal policy?
The act requires that PI be destroyed “as soon as practicable, but no later than one year from the date the information is no longer necessary for the purpose for which it was collected and there are no pending requests or orders for access to such information”
Video Privacy Protection Act of 1988 (VPPA): private right of action or compensation?
- It affords a private right of action for violations and allows for actual or statutory damages, punitive damages, and reasonable attorney’s fees and court costs.
- Statutory damages are set at $2,500.
- Cases against Blockbuster, Netflix, and Redbox, suggest that the private right of action extends only to disclosure-related violations and not violations based merely on improper retention
Video Privacy Protection Act of 1988 (VPPA) and preemption?
The VPPA does not preempt more protective state laws, which may give rise to stricter penalties
Video Privacy Protection Act Amendments Act of 2012
Allowed for one-time consumer consent that was valid for up to two years, replacing the contemporaneity requirement
Self-Regulation for Online Advertising examples
- Digital Advertising Alliance (DAA) Self-Regulatory Principles for Online Behavioral Advertising and
- The Network Advertising Initiative (NAI) Code of Conduct
DAA
A nonprofit organization that collaborates with businesses, public policy groups and public officials to establish and enforce “responsible privacy practices across industry for relevant digital advertising, providing consumers with enhanced transparency and control
NAI
- A nonprofit self-regulatory association comprised exclusively of third-party digital advertising companies.
- The NAI Code of Conduct is a list of self-regulatory principles that all NAI members agree to uphold.
- The Code requires notice and choice with respect to interest-based advertising, limits on the types of data that member companies can use for advertising purposes, and a number of substantive restrictions on member companies’ collection, use, and transfer of data used for online behavioral advertising
Consequences of the FCC reclassification of the broadband Internet service as a public utility as part of its “Open Internet” or net neutrality rule?
An important effect of the reclassification is that broadband Internet providers also became subject to other requirements of the Telecommunications Act of 1996, notably including the CPNI privacy requirements in Section 222
The FCC proposed new privacy rules for broadband Internet providers and received 50,000 comments concerning these proposed rules. In November 2016, the FCC adopted rules that, among other requirements, would have:
(1) required customer opt-in for uses of sensitive personal information,
(2) allowed the use of customer opt-out for uses not involving sensitive personal information and
(3) permitted inferred customer consent for providing the underlying services and related uses
California Online Privacy Protection Act (CalOPPA)
- Amended by Assembly Bill 370; these amendments, which required privacy policies to include information on how the operator responds to Do Not Track signals or similar mechanisms.
- The law also requires privacy policies to state whether third parties can collect PII about the site’s users
Specifically, the CalOPPA, including its Do Not Track amendments, requires the operator of a website to display a privacy notice that meets certain content requirements. These include disclosing:
- The categories of PII collected through the site
- The categories of third-party entities with whom the operator may share PII or other content
- How the operator responds to web browsers’ Do Not Track signals or other mechanisms that provide consumers the ability to choose regarding collection of PII about an individual consumer’s online activities overs time and across third-party websites
- Whether other parties may collect PII about an individual consumer’s online activities over time and across different websites when a consumer uses the operator’s website
Privacy in the workplace: constitutional law
- The U.S. Const. has significant workplace privacy provisions that apply to the federal and state governments, but it does not affect private-sector employment
- The 4th Amendment prohibits unreasonable searches and seizures by state actors Courts have interpreted this amendment to place limits on the ability of government employers to search employees’ private spaces, such as lockers and desks.
- Some states, including California, have extended their constitutional rights to privacy to private-sector employees
The most important contracts concerning employee privacy are __________
The most important contracts concerning employee privacy are collective bargaining agreements
Turning to tort law, at least three common-law torts can be relevant to employee privacy, although U.S. law generally requires a fairly egregious fact pattern before imposing liability on the employer
- intrusion on seclusion
- publicity given to private life
- defamation
Intrusion on seclusion
One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person
Publicity given to private life
One who gives publicity to a matter concerning the private life of another is subject to liability to the other for invasion of his privacy, if the matter publicized is of a kind that (a) would be highly offensive to a reasonable person and (b) is not of legitimate concern to the public
Defamation
So to harm the reputation of another as to lower him in the estimation of the community or to deter third persons from associating or dealing with him.
The United States also has federal laws that regulate employee benefits management. These laws offer certain privacy and security protections for benefits-related information. They also often mandate collection of employee medical information. These laws include the following protections:
- HIPAA contains privacy and security rules that regulate “protected health information” for health insurers, including self-funded health plans.
- COBRA requires qualified health plans to provide continuous coverage after termination to certain beneficiaries.
- The Employee Retirement Income Security Act (ERISA) ensures that employee benefits programs are created fairly and administered properly
- The Family and Medical Leave Act (FMLA) entitles certain employees to unpaid leave in the event of birth or illness of self or a family member
Other federal laws with employment privacy implications regulate data collection and record keeping:
- Fair Credit Reporting Act (FCRA) regulates the use of “consumer reports” obtained from consumer reporting agencies (CRAs) in reference checking and background checks of employees
- Fair Labor Standards Act (FLSA) establishes the minimum wage and sets standards for fair pay
- Occupational Safety and Health Act (OSHA) regulates workplace safety
- Whistleblower Protection Act protects federal employees and applicants for employment who claim to have been subjected to personnel actions because of whistleblowing activities
- National Labor Relations Act (NLRA) sets standards for collective bargaining, which also applies in social media communications
- Immigration Reform and Control Act (IRCA) requires employment eligibility verification
- Securities Exchange Act of 1934 requires disclosures about payment and other information about senior executives of publicly traded companies, as well as registration requirements for market participants such as broker-dealers and transfer agents
Two statutory regimes that govern specific monitoring practices by employers:
- The Employee Polygraph Protection Act of 1988, which limits employer use of lie detectors
- Electronic surveillance laws, including the Wiretap Act, the Electronic Communications Privacy Act and the Stored Communications Act (SCA)
Employee privacy is protected by several federal agencies . . .
- U.S. Department of Labor
- The Equal Employment Opportunity Commission (EEOC)
- Federal Trade Commission (FTC)
- The Consumer Financial Protection Bureau (CFPB)
- The National Labor Relations Board (NLRB)
Department of Labor (DOL)
- Oversees the welfare of job seekers, wage earners, and retirees of the US by improving their working conditions, advancing their opportunities for profitable employment, protecting their retirement and health care benefits, helping employers find workers, strengthening free collective bargaining, and tracking changes in employment, prices, and other national economic measurements
- To achieve this mission, the department administers a variety of federal laws, FLSA, OSHA and ERISA
Equal Employment Opportunity Commission (EEOC)
- Works to prevent discrimination in the workplace
- The EEOC oversees many laws, including Title VII of the Civil Rights Act, the Age Discrimination in Employment Act of 1967 (ADEA) and Titles I and V of the Americans with Disabilities Act of 1990 (ADA)
Employee privacy: Federal Trade Commission (FTC) and Consumer Financial Protection Bureau (CFPB)
Both the FTC and the CFPB regulate unfair and deceptive practices and enforce a variety of laws, including the FCRA, which limits employers’ ability to receive an employee’s or applicant’s credit report, driving records, criminal records and other consumer reports obtained from a CRA
National Labor Relations Board (NLRB)
Administers the National Labor Relations Act. The board conducts elections to determine if employees want union representation and investigates and remedies unfair labor practices by employers and unions
Privacy issues: before employment
Before employment, employers should consider rules and best practices about background screening, including rules for accessing employee information under the FCRA
Privacy issues: during employment
During employment, major topics include polygraphs and psychological testing; substance testing; employee monitoring, including of phone calls and emails; and emerging issues such as social network monitoring and “bring your own device (BYOD)”
Privacy issues: after employment
After employment, the main issues are terminating access to physical and informational assets, and proper human resources practices post-employment
True or False? Employment laws in the United States often provide employers with more discretion than laws in the EU and other countries in the handling of personal information
True. Employment laws in the United States often provide employers with more discretion than laws in the EU and other countries in the handling of personal information
Some important trends have stimulated an increase in applicant screening. For example:
- The terrorist attacks of September 11, 2001, resulted in heightened attention to security issues and support for more stringent identity-verification requirements
- Greater attention to child abuse and abductions has led to laws in almost every state requiring criminal background checks for people who work with children
- Business governance scandals, such as those at Enron and WorldCom, spurred passage of the Sarbanes-Oxley Act in 2002, which has increased the incentives for corporate leaders to scrutinize practices in the areas they manage
- The rapid increase of information about candidates from online search and social media sites has made background checks easier
Certain professions are subject to background screening by law
- Typically, anyone who works with the elderly, children or the disabled must now undergo background screening.
- The federal National Child Protection Act authorizes state officials to access the Federal Bureau of Investigation’s National Crime Information Center database for some positions that involve contact with children.
- Many state and federal gov’t jobs require rigorous background checks to obtain a security clearance
The EEOC has cautioned businesses that they should carefully review background screening processes, such as . . .
denying employment based on criminal convictions, to ensure that their requirements are job related and consistent with business necessity
The US has a number of federal laws that prohibit discrimination in employment and have sometimes been used to limit background checks, notably:
- Title VII of the Civil Rights Act of 1964 bars discrimination in employment due to race, color, religion, sex and national origin.
- The Equal Pay Act of 1963 bars wage disparity based on sex.
- The Age Discrimination Act bars discrimination against individuals over 40
- The Pregnancy Discrimination Act bars discrimination due to pregnancy, childbirth and related medical conditions
- ADA bars discrimination against qualified individuals with disabilities
- GINA
- The Bankruptcy Act provision 11 U.S.C. § 525(b) prohibits employment discrimination against persons who have filed for bankruptcy. There is some ambiguity, however, as to whether the statute applies to discrimination prior to the extension of an offer of employment, and courts have read the statute both ways