United States: Cybersecurity And Data Privacy: 2016 Outlook

As the cybersecurity and data privacy landscapes continue to shift around the world, the value for businesses of understanding those threats and responding in a strategic, coordinated and enterprise‐wide fashion will be greater than ever in 2016.

Cybersecurity and data privacy were top priority issues in 2015 for companies in a broad range of industries. Businesses took an array of steps to identify and mitigate the legal, reputational and business risks associated with these issues. For example, many businesses strengthened internal plans and capabilities to defend company networks and to respond to cybersecurity incidents, ensured effective oversight by their boards of directors, fine-tuned vendor agreements to account for cybersecurity and data privacy interests and worked closely with policy makers at the state and federal levels. Businesses also increasingly engaged with regulatory and enforcement agencies and, where necessary, contested high-stakes class actions.

This year is poised to see cybersecurity and data privacy continue to grow in importance for companies doing business in the United States and for US businesses operating globally. Here, we highlight five priority issues that these companies should consider as they assess, refine and operate their cybersecurity and data privacy programs in 2016:

  • Increasingly global governance of cybersecurity and data privacy;
  • Expanding regulatory and enforcement activity;
  • Continued growth in cybersecurity and data privacy litigation;
  • Substantial law enforcement activity; and
  • Expanding global and technological scope of policy debates.

Increasingly Global Governance of Cybersecurity and Data Privacy Many of the most significant cybersecurity and data privacy developments for US companies may well be seen outside the United States in 2016. Multinational businesses must navigate an expanding array of international statutes, regulations and enforcement policies. Increasingly, so, too, must businesses without any international footprint. A company's data may very well cross borders—whether to be stored at an international data center (e.g., for a private cloud) or to be processed remotely (e.g., by a payroll service)—even for otherwise domestic businesses.

Last year saw significant upheaval in the legal regimes governing cybersecurity and data privacy across the globe, most notably with the invalidation of the US-EU safe harbor scheme.

In 2016, businesses should expect to see continued evolution in the international sphere. Three trends are likely to be particularly significant:

  • Continued Evolution of Data Transfer Regimes. The Schrems decision by the Court of Justice of the European Union in October 2015 invalidated the Safe Harbor regime upon which many companies relied for their transfer of personal data from Europe to the United States. Representatives from the US Department of Commerce and the European Commission had already begun negotiating a "Safe Harbor 2.0" when the Schrems opinion was handed down, but the likelihood of the success of the negotiations remains unclear. Some national data protection authorities in Europe have threatened that, absent sufficient progress by January 31, 2016, they will begin bringing enforcement actions and potentially start to investigate the legitimacy of other transfer methods. Such steps could have dramatic implications for companies transferring data from the European Union to the United States.
  • Expansion of Regulatory Regimes. Companies will face a host of new and expanding cybersecurity and data privacy regulatory regimes across the globe in 2016. Companies will be required to navigate many of these regulations for the first time, even as more rules are developed in other jurisdictions. For example:

    • Europe. In December 2015, the European Commission released a new General Data Protection Regulation, which is to be approved by the European Parliament in early 2016 and to take effect by early 2018. This regulation will substantially revise data protection and privacy rules for covered businesses (called "data controllers" under the regulation) and impose a new breach notification requirement. The regulation will harmonize data protection laws across the European Union and will apply to foreign entities that offer goods or services to individuals in the European Union.
    • Indonesia. In 2016, Indonesia will implement the first data protection law in the country's history. Companies doing business in Indonesia will be subject to its various requirements regarding data collection, usage, management and transfer.
    • Australia. Amendments to laws in Australia now require covered businesses to disclose any "serious data breach" to the Office of the Australian Information Commissioner and take reasonable steps to notify individuals whose data has been compromised by a breach.
    • Continued International Engagement on Cybersecurity and Data Privacy. In 2015, there was significant international discussion and debate on cybersecurity and data privacy, including between the United States and China. For example, in September 2015, President Obama and President Xi Jinping publicly confronted the thorny issue of economic espionage by agreeing that neither country's government would conduct or knowingly support the cyber-enabled theft of confidential business information, trade secrets or other intellectual property in order to provide competitive benefits to their own industries. Then, in December, China passed a new counter-terrorism law that requires Internet service providers to disclose encryption keys to government authorities and to enhance their monitoring and reporting of Internet content. This year is likely to bring continued international developments on a broad range of contentious cybersecurity and data privacy issues. These changes may have substantial consequences for businesses, potentially altering the scale and origin of the cyber threats they face, their access to foreign markets and the scope of their responsibilities in foreign jurisdictions.

    Expanding Regulatory and Enforcement Activity

    Like their international counterparts, regulatory and enforcement agencies in the United States continued to expand their activities addressing cybersecurity and data privacy issues in 2015. As different federal and state agencies pursued their own distinct agendas, businesses faced a growing patchwork of regulatory requirements— a trend that is set to continue in 2016. The likely common denominators of these are more expansive and detailed rules and more frequent enforcement of those rules. Consequently, companies in a wide variety of industries should expect greater scrutiny and more substantial compliance costs as yet more agencies enter the regulatory field, new rules are implemented and regulated entities are examined for compliance with these new rules. In particular, companies should expect:

    • Greater Regulatory and Enforcement Activities by the Federal Trade Commission (FTC) Across a Broad Range of Fields. In 2015, the US Court of Appeals for the Third Circuit affirmed the FTC's ability to regulate cybersecurity practices through its "unfairness" authority under Section 5 of the FTC Act. Likewise, the FTC signaled its intent to aggressively enforce existing privacy laws and to focus on such evolving areas as big data, tracking consumers across devices and privacy notices for mobile applications. Companies should expect the FTC to pursue these topics throughout 2016, including through guidance regarding best practices, white papers, workshops and enforcement actions. For example, in June 2015, the FTC released a guide highlighting lessons learned from its 50-plus law enforcement actions concerning data security. Additionally, the FTC has made clear that it may bring enforcement actions on a wide range of theories relating to the use of big data, de-anonymization and the potential disparate effects on certain consumers arising from the use of collected data. As with other topics, other regulators at the state and federal levels are likely to collaborate with the FTC or otherwise follow its lead.
    • Continued Expansion of Cybersecurity Regulation by Financial Services Regulators. Federal regulators of banks and other financial services companies have long been active in the oversight of cybersecurity at regulated entities. Often, their actions have set the tone for other regulated industries, as other federal and state regulators have adopted similar principles for their respective industries. This trend of financial services regulators acting aggressively on cybersecurity is on track to continue at the federal and state levels. For example, the New York State Department of Financial Services is set to embark on a major rulemaking in 2016. This regulator of New York-chartered banks and insurance companies (including non-US banks doing business in New York) is expected to propose new requirements regarding; cybersecurity policies and procedures; management of third-party service providers; multi-factor authentication; appointment of a Chief Information Security Officer; application security; audits; and notice in the event of a cybersecurity incident.
    • Amendments to State Data Breach Notification Requirements. The patchwork of state data security and data breach notification laws continues to grow more complex in the continuing absence of federal standards. Companies should expect this trend to continue in 2016. For example, the California legislature revised its data breach laws effective January 1, 2016, to expand and clarify the existing notice requirements and to specify forms for notices. Entities around the country will need to consider California's new requirements, as well as any potential incompatibility with other states' notice requirements. (And companies will need to remain cognizant of their obligations under relevant state data security regulations, such as by implementation of a written information security program to satisfy Massachusetts law, where applicable.)
    • Increased Regulation and Examination of Cybersecurity in the Securities and Commodities Markets. Regulatory agencies with supervisory authority over broker-dealers, investment advisers and financial market utilities have made it clear that cybersecurity will be an increasing focus of supervisory exams. In 2014 and 2015, for example, the Financial Industry Regulatory Authority (FINRA) and the Securities and Exchange Commission (SEC) reviewed the cybersecurity practices of a sample of brokerdealers and investment advisers and determined that there was a need to incorporate cybersecurity preparedness assessments in regulatory examinations. Similarly, in 2015, the Commodity Futures Trading Commission (CFTC) held a roundtable with industry experts to identify cyber threats to its regulated financial market utilities, and the National Futures Association (NFA) adopted requirements and guidance related to "Information Systems Security Programs." Entities in these industries should expect this focus to be reflected in regulatory guidance issued and examinations performed in 2016.
    • Federal Communications Commission (FCC) Rulemaking To Develop Privacy Rules for Internet Service Providers. The FCC's reclassification of Internet service as a telecommunications service last year opened the door to new privacy regulations for providers of broadband Internet service. FCC Chairman Tom Wheeler has stated that this rulemaking could begin in early 2016. These new rules could address data breach notification, customer consent to share data, data protection and other significant issues for Internet service providers.

    Continued Growth in Cybersecurity and Data Privacy Litigation

    There were important developments in cybersecurity and data privacy class action litigation in 2015. Significant decisions, such as the US Court of Appeals for the Seventh Circuit's decision arising from the Neiman Marcus breach, were issued by courts of appeals. In addition, the US Supreme Court heard argument in Spokeo v. Robins, which considers whether the violation of a right that triggers statutory damages can substitute for injury-in-fact for purposes of Article III standing.

    The pace of data breach litigation continued to increase in 2015. Plaintiffs filed nearly 250 class actions respecting some 35 different data breaches last year. This year, litigation continues to be likely in the aftermath of large-scale data breaches and, increasingly, more smaller-scale data breaches as well. Indeed, 2016 is poised to continue trends seen in 2015, including: significant disputes over whether consumer plaintiffs have alleged cognizable injury for Article III standing—and thus may proceed past the pleading stage; litigation over indemnification for expenses sustained by third parties as a result of a data breach (e.g., disputes regarding insurance coverage under cybersecurity policies); and the pursuit of data breach-related derivative lawsuits in a limited number of cases.

    In addition, 2016 is almost certain to see courts more frequently decide issues that are relatively novel in the data breach context. These include:

    • Class Certification. Data breach plaintiffs routinely employ tactics from the outset of litigation in an attempt to overcome the predominance requirement for class certification. For instance, to avoid the issue of having to prove damages on an individual basis, they have attempted to assert claims for injunctive relief under state consumer fraud statutes—which allow for recovery of attorneys' fees—to require that companies implement specific data security safeguards. What is more, in non-data breach class actions, a number of courts have been willing to certify class actions to resolve common issues, even where individual issues of injury and the amount of damages exist and would have to be addressed in a more individualized proceeding after the common issues are resolved. In spite of such maneuvering, class certification is likely to remain a major hurdle for data breach class action plaintiffs in 2016 (despite some notable exceptions in 2015). However, the risk that companies will have to defend data breach litigation on the merits against a certified class is growing, making it increasingly important—from a litigation perspective—for businesses to take reasonable cybersecurity measures prior to a data breach.
    • Discovery. In 2016, it is likely that we will see more decisions on the scope of discovery in the data breach context. In 2015, for example, a federal magistrate judge found that certain documents created by a task force established by in-house and outside counsel to educate the attorneys about a breach and to enable them to provide legal advice to the affected company were privileged. A key issue in this decision was whether the documents at issue were created for a legal or business purpose.
    • Summary Judgment. This year may provide significant developments with respect to summary judgment in data breach litigation. Three noteworthy issues to be considered at this stage are: (i) the proper standard of care (i.e., what security safeguards was the affected company required to implement); (ii) what types of injuries are legally compensable (e.g., whether time spent to respond to a data breach or fees paid for data breach protection are recoverable); and (iii) causation and actual injury (i.e., whether plaintiffs can prove that the data breach caused those injuries).

    While data breach cases continue to proliferate and to dominate headlines, recent studies have reported a significantly greater number of data privacy lawsuits in the last few years. Data privacy lawsuits have pursued complaints under statutes ranging from the Telephone Consumer Protection Act (TCPA) to the Fair Credit Reporting Act (FCRA). This trend is also likely to continue in 2016, as plaintiffs try to fit new technologies and new uses under existing laws. The increasing connectivity of devices and their use throughout consumers' day-to-day lives appears certain to produce a steady stream of aggressive legal claims.

    Substantial Law Enforcement Activity

    Highly publicized cyber intrusions in 2015 underscored the increasing productivity, sophistication and diversification of cyber threat actors' schemes. Such schemes targeted intellectual property, proprietary pricing data and medical information, among other types of sensitive information. They also damaged companies' systems, imposed significant financial and reputational costs and even threatened national security interests. Law enforcement agencies continue to evolve to address these threats to the private sector, and businesses should expect 2016 to see substantial law enforcement activity, further raising the importance of developing productive relationships with relevant authorities before a crisis arises.

    • Prosecuting Cybercriminals. The number of cybercrime investigations and prosecutions is expected to increase in 2016 and continue the long-term trend of growing collaboration among domestic and foreign agencies to target threat actors around the world. For example, the US Department of Justice plans to disrupt and dismantle 1,000 cyber threat actors and to resolve 90 percent of national security and criminal cyber cases during the next fiscal year. These ambitious targets reflect the vast augmentation of resources that the government has brought to bear against the cyber threat. Since 2002, the FBI's number of cyber intrusion investigations has grown by more than 80 percent. And, since 2010, the US Secret Service's cybercrime investigations have resulted in more than 5,000 arrests associated with more than $12 billion in actual and potential fraud losses.
    • International Engagement. To continue at this pace and reach or exceed their targets, federal law enforcement agencies will need to cooperate extensively with their domestic and international counterparts. For example, in 2015, a prosecution for an alleged hacking and insider trading scheme was the result of collaboration among a who's who of law enforcement agencies: the US Department of Justice, SEC, US Department of Homeland Security, US Secret Service, FBI, FINRA, UK Financial Conduct Authority and the Danish Financial Supervisory Authority. Similarly, the arrest, extradition and prosecution of Vladimir Drinkman for a data breach conspiracy involving over 160 million compromised credit card numbers resulted from coordination among law enforcement agencies in multiple countries. International cooperation of this sort will continue to define many of the most high-profile cybercrime investigations.
    • Partnership with the Private Sector. For years, law enforcement agencies have viewed partnerships with private entities as critical to promoting cybersecurity. According to a 2010 White House report, "[p]rivatesector engagement is required to help address the limitations of law enforcement and national security." As is discussed in greater detail below, the Cybersecurity Information Sharing Act is expected to augment both the government and the private sector's access to information about cyber threats and to bring new private-sector players into the conversation. Overall, law enforcement agencies expect that this broader private sector participation will help them to investigate threat actors and disrupt their attacks and schemes.

    Expanding Global and Technological Scope of Policy Debates

    Policy debates shifted in 2015 as cybersecurity and data privacy issues attracted both national and global prominence. Policy developments in 2016 likely will continue this trend. For example, it is expected that: (i) industry will take advantage of significant legal authorities approved in 2015, such as the Cybersecurity Information Sharing Act and new "cyber sanctions," both of which will require effective collaboration between the private sector and government; (ii) long-standing debates about privacy and security will be moved to the global stage (and likely become more political as the US presidential election approaches); and (iii) the proliferation of toys, devices and machines that are connected to the Internet will present new cybersecurity and data privacy challenges.

    • Cybersecurity Information Sharing Act of 2015. In December 2015, the multiyear debate over the appropriate mechanisms and legal protections for cybersecurity information sharing came to a close with passage of the Cybersecurity Information Sharing Act. This legislation provides new authorities for private sector businesses to monitor and defend their networks and share cyber threat information with the federal government and other private sector entities. With the ground rules for information sharing between and among the private sector and government now set, 2016 presents opportunities for businesses to take advantage of the authorities and liability protections this law offers.
    • Cyber Sanctions. The US government is poised to use economic sanctions in 2016 as a new tool to deter foreign hackers from stealing vital assets from businesses—whether source code or confidential negotiating positions. Last year, President Obama issued Executive Order 13694, which created a new sanctions program aimed at actors outside of the United States who threaten US national security or target the country's critical infrastructure, computer networks, intellectual property, economic resources or other vital assets. An initial set of regulations was published in the Federal Register on December 31, 2015, and it could only be a matter of time before the first entities are added to the sanctions list.
    • Encryption. As countries increasingly ask technology companies for law enforcement access to communications, the question of encryption has become a global issue. Last year saw the rise of the public debate over encryption, and 2016 is likely to see it play out on a global stage. This significant policy debate may well become even more polarized during the year of a presidential election in the United States, posing potential hindrances to passing legislation or reaching international consensus.
    • Internet of Things. There was a significant increase in policy debates in 2015 concerning cybersecurity and data privacy issues raised by the Internet of Things. From consumer products to industrial machinery, the cybersecurity and data privacy implications of the Internet of Things were scrutinized by Congress and executive branch policymakers. Automotive cybersecurity and data privacy issues, for example, were the focus of multiple pieces of proposed legislation and of regulatory study. Likewise, the Food and Drug Administration recently issued guidance on post-market management of cybersecurity in medical devices. This year will likely see continued growth in policymakers' attention to the Internet of Things as the number, kind and capability of connected devices continues to grow.

    Cybersecurity and data privacy present novel, complex and global issues across the legal, policy and regulatory spectrum. These developments pose challenges that demand a proactive, riskbased response. Businesses must address these risks in a holistic fashion that reflects the strategic interests of their organizations and is effectively coordinated across their enterprises. From board oversight to the drafting of an outsourcing contract, from policy development to breach response, and from regulatory rulemaking to litigation, businesses should understand the risks they face and deliver a considered and multifaceted response. As the cybersecurity and data privacy landscapes continue to shift around the world, the value for businesses of understanding those threats and responding in a strategic, coordinated and enterprise-wide fashion will be greater than ever in 2016.

    Visit us at mayerbrown.com

    Mayer Brown is a global legal services provider comprising legal practices that are separate entities (the "Mayer Brown Practices"). The Mayer Brown Practices are: Mayer Brown LLP and Mayer Brown Europe – Brussels LLP, both limited liability partnerships established in Illinois USA; Mayer Brown International LLP, a limited liability partnership incorporated in England and Wales (authorized and regulated by the Solicitors Regulation Authority and registered in England and Wales number OC 303359); Mayer Brown, a SELAS established in France; Mayer Brown JSM, a Hong Kong partnership and its associated entities in Asia; and Tauil & Chequer Advogados, a Brazilian law partnership with which Mayer Brown is associated. "Mayer Brown" and the Mayer Brown logo are the trademarks of the Mayer Brown Practices in their respective jurisdictions.

    © Copyright 2016. The Mayer Brown Practices. All rights reserved.

    This Mayer Brown article provides information and comments on legal issues and developments of interest. The foregoing is not a comprehensive treatment of the subject matter covered and is not intended to provide legal advice. Readers should seek specific legal advice before taking any action with respect to the matters discussed herein.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Authors
 
In association with
Related Video
Up-coming Events Search
Tools
Print
Font Size:
Translation
Channels
Mondaq on Twitter
 
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
 
Email Address
Company Name
Password
Confirm Password
Position
Mondaq Topics -- Select your Interests
 Accounting
 Anti-trust
 Commercial
 Compliance
 Consumer
 Criminal
 Employment
 Energy
 Environment
 Family
 Finance
 Government
 Healthcare
 Immigration
 Insolvency
 Insurance
 International
 IP
 Law Performance
 Law Practice
 Litigation
 Media & IT
 Privacy
 Real Estate
 Strategy
 Tax
 Technology
 Transport
 Wealth Mgt
Regions
Africa
Asia
Asia Pacific
Australasia
Canada
Caribbean
Europe
European Union
Latin America
Middle East
U.K.
United States
Worldwide Updates
Check to state you have read and
agree to our Terms and Conditions

Terms & Conditions and Privacy Statement

Mondaq.com (the Website) is owned and managed by Mondaq Ltd and as a user you are granted a non-exclusive, revocable license to access the Website under its terms and conditions of use. Your use of the Website constitutes your agreement to the following terms and conditions of use. Mondaq Ltd may terminate your use of the Website if you are in breach of these terms and conditions or if Mondaq Ltd decides to terminate your license of use for whatever reason.

Use of www.mondaq.com

You may use the Website but are required to register as a user if you wish to read the full text of the content and articles available (the Content). You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these terms & conditions or with the prior written consent of Mondaq Ltd. You may not use electronic or other means to extract details or information about Mondaq.com’s content, users or contributors in order to offer them any services or products which compete directly or indirectly with Mondaq Ltd’s services and products.

Disclaimer

Mondaq Ltd and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published on this server for any purpose. All such documents and related graphics are provided "as is" without warranty of any kind. Mondaq Ltd and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Mondaq Ltd and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from this server.

The documents and related graphics published on this server could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Mondaq Ltd and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time.

Registration

Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:

  • To allow you to personalize the Mondaq websites you are visiting.
  • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our information providers who provide information free for your use.

Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.

If you do not want us to provide your name and email address you may opt out by clicking here .

If you do not wish to receive any future announcements of products and services offered by Mondaq by clicking here .

Information Collection and Use

We require site users to register with Mondaq (and its affiliate sites) to view the free information on the site. We also collect information from our users at several different points on the websites: this is so that we can customise the sites according to individual usage, provide 'session-aware' functionality, and ensure that content is acquired and developed appropriately. This gives us an overall picture of our user profiles, which in turn shows to our Editorial Contributors the type of person they are reaching by posting articles on Mondaq (and its affiliate sites) – meaning more free content for registered users.

We are only able to provide the material on the Mondaq (and its affiliate sites) site free to site visitors because we can pass on information about the pages that users are viewing and the personal information users provide to us (e.g. email addresses) to reputable contributing firms such as law firms who author those pages. We do not sell or rent information to anyone else other than the authors of those pages, who may change from time to time. Should you wish us not to disclose your details to any of these parties, please tick the box above or tick the box marked "Opt out of Registration Information Disclosure" on the Your Profile page. We and our author organisations may only contact you via email or other means if you allow us to do so. Users can opt out of contact when they register on the site, or send an email to unsubscribe@mondaq.com with “no disclosure” in the subject heading

Mondaq News Alerts

In order to receive Mondaq News Alerts, users have to complete a separate registration form. This is a personalised service where users choose regions and topics of interest and we send it only to those users who have requested it. Users can stop receiving these Alerts by going to the Mondaq News Alerts page and deselecting all interest areas. In the same way users can amend their personal preferences to add or remove subject areas.

Cookies

A cookie is a small text file written to a user’s hard drive that contains an identifying user number. The cookies do not contain any personal information about users. We use the cookie so users do not have to log in every time they use the service and the cookie will automatically expire if you do not visit the Mondaq website (or its affiliate sites) for 12 months. We also use the cookie to personalise a user's experience of the site (for example to show information specific to a user's region). As the Mondaq sites are fully personalised and cookies are essential to its core technology the site will function unpredictably with browsers that do not support cookies - or where cookies are disabled (in these circumstances we advise you to attempt to locate the information you require elsewhere on the web). However if you are concerned about the presence of a Mondaq cookie on your machine you can also choose to expire the cookie immediately (remove it) by selecting the 'Log Off' menu option as the last thing you do when you use the site.

Some of our business partners may use cookies on our site (for example, advertisers). However, we have no access to or control over these cookies and we are not aware of any at present that do so.

Log Files

We use IP addresses to analyse trends, administer the site, track movement, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information.

Links

This web site contains links to other sites. Please be aware that Mondaq (or its affiliate sites) are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of these third party sites. This privacy statement applies solely to information collected by this Web site.

Surveys & Contests

From time-to-time our site requests information from users via surveys or contests. Participation in these surveys or contests is completely voluntary and the user therefore has a choice whether or not to disclose any information requested. Information requested may include contact information (such as name and delivery address), and demographic information (such as postcode, age level). Contact information will be used to notify the winners and award prizes. Survey information will be used for purposes of monitoring or improving the functionality of the site.

Mail-A-Friend

If a user elects to use our referral service for informing a friend about our site, we ask them for the friend’s name and email address. Mondaq stores this information and may contact the friend to invite them to register with Mondaq, but they will not be contacted more than once. The friend may contact Mondaq to request the removal of this information from our database.

Security

This website takes every reasonable precaution to protect our users’ information. When users submit sensitive information via the website, your information is protected using firewalls and other security technology. If you have any questions about the security at our website, you can send an email to webmaster@mondaq.com.

Correcting/Updating Personal Information

If a user’s personally identifiable information changes (such as postcode), or if a user no longer desires our service, we will endeavour to provide a way to correct, update or remove that user’s personal data provided to us. This can usually be done at the “Your Profile” page or by sending an email to EditorialAdvisor@mondaq.com.

Notification of Changes

If we decide to change our Terms & Conditions or Privacy Policy, we will post those changes on our site so our users are always aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will notify users by way of an email. Users will have a choice as to whether or not we use their information in this different manner. We will use information in accordance with the privacy policy under which the information was collected.

How to contact Mondaq

You can contact us with comments or queries at enquiries@mondaq.com.

If for some reason you believe Mondaq Ltd. has not adhered to these principles, please notify us by e-mail at problems@mondaq.com and we will use commercially reasonable efforts to determine and correct the problem promptly.