United States: Privacy & Cybersecurity Update May 2019

In this month's edition of our Privacy & Cybersecurity Update,  we examine expanded data breach notification laws in New Jersey and Washington state, as well as the SEC's risk alert regarding cloud-based storage solutions. We also review recent enforcement actions in Denmark and the U.K. that provide guidance on customer service call recording and monitoring, and the FTC's request that Congress pass federal privacy and data security legislation.

New Jersey Expands Definition of 'Personal Information' to Include Information Used to Access Online Accounts

Washington State Amends Data Breach Notification Law

Danish and UK Data Protection Authorities Provide Guidance on Customer Call Recording Under the GDPR

SEC Issues Risk Alert Regarding Cloud-Based Storage

Verizon Releases Annual Data Breach Investigations Report

FTC Requests Federal Privacy and Data Security Legislation

New Jersey Expands Definition of 'Personal Information' to Include Information Used to Access Online Accounts

New Jersey has broadened its definition of "personal information" to include information that would permit access to any online account. Under the new law, a breach of such information would trigger the notification requirements.

On May 10, 2019, New Jersey Gov. Phil Murphy signed into law an amendment to the state’s data breach notification law.1 The amendment requires New Jersey businesses and New Jersey state and local entities to notify state residents of any breach of security related to information that permits access to online accounts.

Prior to the amendment, businesses and public entities were required to disclose breaches involving “personal information,” where such information referred to an individual’s first name (or first initial) and last name linked with any specified data points. Those specified data points consisted of the individual’s Social Security number, driver’s license number, state identification card number, financial account number, or credit or debit card numbers combined with any required security code, access code or password that would permit access to the individual’s financial accounts.

The amendment broadens the definition of “personal information” to include “user name, email address or any other account holder identifying information, in combination with any password or security question and answer that would permit access to an online account.” Thus, under the amended law, a breach of information permitting access to any online account, rather than just a financial account, would trigger the notification requirements.

The amendment further provides that, in the case of a security breach involving information permitting access to an online account, the entity that experienced the breach may provide the required notice to New Jersey residents by electronic or other means directing the affected individual to change any password, security question or answer, as applicable, or to take other suitable steps to protect the applicable online account. The entity may not, however, provide notice to an email account affected by the security breach. The amendment takes effect on September 1, 2019.

Key Takeaways

Companies that conduct business in New Jersey and collect user names and related passwords — or security questions — from state residents should update their security incident response plans to ensure appropriate notification of residents in the event that the company experiences a data breach involving such information.

Washington State Amends Data Breach Notification Law

Washington state has amended its data breach notification law, expanding the list of categories of data to which the notification requirements apply, and revising the timeline in which notifications to individuals must be made.

Washington state Gov. Jay Inslee signed HB 1071 into law on May 7, 2019,2 amending the state's data breach notification law. The revisions add more categories of personal information to the statute’s notification requirements and shorten the timeline to notify affected individuals to 30 days.

Previously, an entity conducting business in Washington only was required to notify a state resident of a breach if the individual’s name was accessed in combination with the individual’s Social Security number, state identification card number or financial account information. Under the new law, the definition of “personal information” is expanded to require notification to individuals involved in breaches in which the individual’s name is accessed in combination with any of the following data elements:

  • full date of birth;
  • a private key that is unique to an individual and used to authenticate or sign an electronic record;
  • a student, military or passport identification number;
  • a health insurance policy number or health insurance identification number;
  • any information about the individual’s medical history, mental or physical condition, medical diagnosis by a health care professional or treatment of the individual; or
  • biometric data generated by automatic measurements of an individual’s biological characteristics, such as a fingerprint, voiceprint, eye retinas, irises or other unique biological patterns or characteristics that is used to identify a specific individual.

In addition, the amendment requires Washington residents to be notified if any of the above-listed data elements are accessed without the individual’s name if the accessed data is (1) not encrypted or redacted and (2) would enable a person to commit identity theft.

Like the New Jersey amendment summarized above, the amendment also requires entities that experience a data breach to notify individuals of a breach if their username or email address is obtained in combination with a password or security questions (and answers) that would permit access to an online account. If the breach involves a username or password, an entity may provide the required notice to the affected individuals by email. The email must advise the individuals to change their passwords and security questions and answers promptly, or take other steps to protect their online account and any other accounts using the same login information. However, if the breach involves credentials of an email account furnished by the entity, the entity may not provide notification to that email address.

Notably, the amendment decreases the amount of time an entity has to notify individuals affected by a breach to 30 days (from the previous 45 days). Notice to affected individuals must include a time frame of exposure of the relevant personal information (if known), including the date the breach occurred and the date it was discovered. As under the prior law, breaches affecting more than 500 Washington residents require notice to the attorney general. The amendment requires additional information to be included in such notice, namely, a list of the types of information affected by the breach, the time frame of exposure, a summary of steps taken to contain the breach and a sample copy of the notice to affected individuals. An updated notice to the attorney general is required if information required to be disclosed pursuant to the law is unknown at the time the notice is due.

The amendments will take effect on March 1, 2020.

Key Takeaways

Companies doing business in Washington should update their security incident response plans to ensure that their data breach notification procedures comply with the amended requirements.

Danish and UK Data Protection Authorities Provide Guidance on Customer Call Recording Under the GDPR

Recent enforcement actions by Denmark’s Data Protection Authority (DPA) and the United Kingdom’s Information Commissioner's Office (ICO) provide new interpretative guidance on how the General Data Protection Regulation (GDPR) extends to customer service call recording and monitoring.

Background

Customers phoning into call centers with questions, complaints, reservations or other purposes, often hear a similar message that states the call "may be recorded for quality assurance and training purposes.” The GDPR introduced a new layer of requirements for both European Economic Area (EEA) and non-EEA companies that process data of individuals in the EEA by recording customer calls. Although the extent of the GDPR’s applicability to these activities is still developing, recent enforcement actions from national supervisory authorities provide some guidance in understanding how the GDPR governs these recordings.

Recording Customer Service Calls Under the GDPR

Broadly speaking, recording a phone conversation is considered a means of processing personal data, bringing that action within the GDPR’s scope. Specifically, companies subject to the GDPR that maintain call center operations and record calls must comply with the legal obligations of data controllers since they determine the purpose and means of personal data processing. In many ways, the GDPR requirements for processing data by recording phone conversations runs parallel to requirements for processing data through other means, albeit with certain nuances and differences.

Standards for Transparency

Under GDPR Article 5, data must be processed lawfully, fairly and transparently. As a result of this transparency requirement, the controller must inform the caller of certain details (i.e. prior information requirements) at the point that data is collected (prior to or at the very start of the call). The prior information requirements set forth in GDPR articles 13-14 are quite lengthy. As such, the large volume of information that must be provided might not be practical in a telephone call. However, the Article 29 Working Party guidelines, published by the European Commission, provide some guidance in relation to the GDPR’s standards for transparency that involve a layered approach. When the controller first engages the data subject (i.e. prior to recording the phone conversation), it should provide the most important information in the form of a first layer notice, including (1) the details of the purposes of processing, (2) the identity of the controller and (3) descriptions of data subjects’ rights. Any additional information required under GDPR articles 13-22 can be provided through other means (e.g. the controller’s external privacy notice), which the controller may refer to at the end of its first layer notice (e.g. by indicating that the full-form privacy notice may be found on the website).

Lawful Means of Processing Data

Under GDPR Article 6, the controller must have legal grounds for collecting and processing data, including the data subject’s consent, which must be freely given, specific, not bundled, informed and unambiguous (often through a clear affirmative action) under the GDPR. The customer also must be able to withdraw consent at any time free of charge. It is important to note that a prerecorded message without any other action (e.g. asking customers to press their keypads to indicate consent to being recorded) may not, strictly speaking, comply with the GDPR’s enhanced definition of “consent.”

To bypass the issue of consent, a company alternatively can process data based on its legitimate interests. Although what constitutes a “legitimate interest” is a fact-intensive inquiry that will vary on a case-by-case basis, the GDPR specifically notes that the use of client data is a potential legitimate interest, but that this legitimate interest also must be balanced against the individual’s interests, rights and freedoms. If the individual’s interests override the legitimate interest, then the controller cannot rely on this legal ground for processing data. As such, most companies without a mechanism for allowing customers to "opt out" of recordings currently take the position that quality assurance and training purposes are legitimate interests in order to lawfully record calls from customers.

Recent Cases

On April 11, 2019, the DPA ruled that Denmark’s largest telecommunications company, TDC A/S (TDC), violated the GDPR by recording customer calls for training purposes without obtaining explicit consent. The issue first came to the DPA’s attention after a TDC agent informed a customer that it was “not possible” to turn off the recording mechanism when the customer asked that the call not be recorded. Although its reasoning was not entirely clear, the DPA rejected TDC’s claim that the improvement of customer service qualified as a legitimate interest to bypass the explicit consent requirement, potentially signalling that companies must take additional steps in the future to comply with the GDPR’s notion of “consent” (e.g., allowing customers to indicate their consent through a keypad) prior to recording calls. The DPA declined to levy the GDPR’s enhanced administrative fines against TDC, but the agency did ban the company from recording customer calls until such steps were implemented.

In a slightly more nuanced case than Denmark’s TDC case, in the week of May 10, 2019, the ICO issued an enforcement action related to biometric data against Her Majesty's Revenue and Customs (HMRC), the U.K. tax authority. In January 2017, HMRC implemented a voice authentication service which required callers, in some instances, to record their voices as their password for login. Per the GDPR, biometric data collected for the purposes of uniquely identifying an individual is considered a “special category of personal data,” the processing of which is prohibited unless certain conditions under GDPR Article 9 are met (most notably, the data subject’s explicit consent). The ICO found that because callers were not provided an option to decline the voice authentication service, HMRC did not adequately inform customers of the purpose of processing their data (in light of the transparency principle) and failed to obtain adequate explicit consent from its customers prior to collecting their biometric data. The ICO gave HMRC 28 days to delete relevant records.

Key Takeaways

Companies that are subject to the GDPR and record customer calls should review their practices in light of these recent decisions to ensure compliance. Both agencies' enforcement actions signal that companies should consider implementing mechanisms to obtain explicit consent from their customers rather than relying purely on legitimate interests as a legal ground for processing data.

SEC Issues Risk Alert Regarding Cloud-Based Storage

The U.S. Securities and Exchange Commission (SEC) has issued a risk alert advising that use of cloud-based storage solutions by investment advisers and broker-dealers may jeopardize the security of electronic customer information.

On May 23, 2019, the Office of Compliance Inspections and Examinations (OCIE) of the SEC released a risk alert highlighting cybersecurity issues associated with broker-dealers’ and investment advisers’ use of cloud-based storage and other network storage solutions.3 Recent OCIE examinations found that firms were underutilizing third-party storage providers' security features, such as encryption and password protection, that are designed to prevent unauthorized access to customer records. Finding a number of cybersecurity lapses, the OCIE cautioned that use of network storage solutions without proper oversight may constitute a failure to comply with Regulations S-P and S-ID concerning security safeguards and identity theft rules, respectively.4 The risk alert also included guidance regarding common deficiencies and best practices for firms using cloud-based or network storage solutions.

Cybersecurity Concerns

In the risk alert, the OCIE listed a number of security failings stemming from the failure to apply firms' internal cybersecurity policies and procedures to third-party storage providers. While the majority of the observed network storage solutions offer sufficient security measures, the agency found that firms are not fully using these third-party security features. The OCIE observed three primary cybersecurity concerns:

  • third-party security settings were not properly configured by firm users at the outset, resulting in issues such as insufficient encryption and inadequate password protection;
  • electronic data was not appropriately classified, and thus, appropriate controls were not applied to sensitive data; and
  • firms failed to institute comprehensive security agreements with vendor-providers prior to installation of network storage solutions.

OCIE Recommendations

The OCIE recommended increased oversight by firms utilizing network storage solutions to mitigate the risk of non-compliance with S-P and S-ID. Firms are encouraged to:

  • develop guidelines ensuring that third-party providers are configuring security settings in accordance with firm standards;
  • implement additional policies and procedures addressing secure installation, maintenance and recurring review of the integrated security measures; and
  • update software and hardware regularly, while also evaluating any changes to the security configuration resulting from those updates.

Key Takeaways

To ensure compliance with SEC rules and regulations, investment adviser and broker-dealer firms should ensure that use of third-party, cloud-based and other network storage solutions comport with firms’ internal cybersecurity policies and procedures. Firms should update their policies and procedures as necessary to require the configuration of storage providers' security settings, secure installation of network storage solutions, and adequate classification of information, including sensitive customer records, stored on such systems.

Verizon Releases Annual Data Breach Investigations Report

Verizon released its annual Data Breach Investigations Report (DBIR), which provides a detailed summary and analysis of security incidents and data breaches that have been reported by public and private entities worldwide.5 This year’s DBIR analyzed 41,686 security incidents, of which 2,013 resulted in the confirmed disclosure or exposure of data. The report identifies general trends with respect to data breaches and security incidents, as well as several industry-specific insights.

General Trends From the DBIR

This year’s DBIR noted the following general trends:

  • Focus on C-Suite Executives: Senior officers and executives were found to be 12 times more likely to be the target of social engineering campaigns, such as targeted phishing emails, as compared to other employees. Senior-level employees are likely to have broad access to company systems and data, which makes them valuable targets for attackers. The DBIR noted that senior-level employees are also “time-starved and under pressure to deliver,” which can sometimes result in the failure to review emails carefully before clicking the hyperlinks or downloading the attachments in emails.
  • Nation-State Attacks: The report showed that 23 percent of data breaches involved attackers that were affiliated with or identified as nation-states, up from 17 percent the previous year.
  • Insider Attacks: Companies often allocate significant resources to protect their systems and data from external threats. However, the DBIR found that 34 percent of security incidents that resulted in the confirmed disclosure or exposure of data involved insiders.
  • Ransomware Attacks: Ransomware attacks involve malware that prevents users from accessing systems or files until the users pay the attackers a certain amount (i.e. , a ransom). These attacks are on the rise and now account for nearly 24 percent of security incidents involving malware.
  • Time to Discover a Breach: The DBIR noted that 56 percent of breaches take a month or longer to be discovered.

Industry-Specific Trends

The DBIR also includes detailed summaries of certain industry-specific trends, including the following:

  • Financial Industry: The introduction of “chip-and-pin” systems has made it more difficult for attackers to commit fraud with physical credit cards. As a result, since 2015, breaches occurring at point-of-sale have decreased by a factor of 10. However, the DBIR notes that this trend may correspond with an increase in attempts to gain unauthorized access to credit card information via web and mobile applications.
  • Health care Industry: Out of all of the industries analyzed, health care was the only industry where security incidents were more likely to be caused by insiders than external threats. However, this conclusion should be considered in light of the extensive breach reporting requirements under HIPAA, which includes recordkeeping obligations that may result in documentation of incidents that are otherwise undocumented by companies that are not subject to sector-specific laws requiring such detailed recordkeeping. Therefore, it is difficult to determine whether the risks posed by health care insiders are unique to that industry.

Key Takeaways

Although analyses of security incidents and data breaches generally rely on self-reported data and do not identify the full scope of security threats — incidents and data breaches that companies experience — companies can consider the DBIR’s findings in allocating cybersecurity resources to address known threats, such as the risk of data breaches caused by company insiders.

FTC Requests Federal Privacy and Data Security Legislation

The Federal Trade Commission (FTC) added its voice to those calling on Congress to pass federal privacy and data security legislation, and requested the ability to impose civil penalties and additional targeted rulemaking authority.

During a hearing before the House Energy and Commerce Committee's Consumer Protection and Commerce Subcommittee on May 8, 2019, the FTC pressed Congress to pass privacy legislation that would both enable the agency to protect American consumers' data more effectively and ease the compliance burden arising from the patchwork of state privacy legislation.

The hearing followed recent criticism of the FTC's enforcement efforts, in which some complained that the penalties imposed by the FTC for certain privacy violations were not sufficient in light of the harm to consumers that resulted from such violations. As part of its testimony, the FTC requested better enforcement tools to protect data security and privacy in the United States through civil penalties, limited rulemaking authority under the Administrative Procedure Act and authority over common carriers and nonprofit organizations.6

The FTC commissioners explained that the agency's ability to punish companies for privacy violations is limited because it cannot directly fine companies, as is often done by its European counterparts, who have the power to impose potentially heavy statutory fines under the GDPR. Currently, rather than fining companies directly, the FTC must bring an action in court seeking an injunction, or negotiate a settlement with violators.

The FTC also called on Congress to increase the agency's budget for tackling privacy violations, explaining that it only has 40 employees dedicated to privacy and data security as compared to the U.K.'s Informational Commissioner's Office, which has roughly 500 employees.

FTC Chairman Joe Simons asked Congress to give his agency targeted, rather than broad, rulemaking authority to write privacy and data security regulations. Limited rulemaking authority, Simons explained, would ensure that Congress, rather than the five FTC commissioners, would be responsible for defining federal privacy priorities.

Key Takeaways

The FTC has joined the growing chorus calling for federal privacy legislation. While it remains to be seen whether and to what extent Congress will pass such legislation, given the FTC’s prominent role in protecting U.S. consumers’ data privacy, Congress may be influenced by the FTC’s testimony.

Footnote

1 A copy of the amendment may be found here.

2 A copy of the amendment may be found here.

3 The full text of the Risk Alert is available here.

4 Regulation S-P’s Safeguard Rule requires firms to adopt written policies and procedures that address the administrative, technical and physical safeguards used to protect customer records and information. 17 C.F.R. 248.30(a)

5 This year’s complete DBIR and an executive summary are available here.

6 Press Release, FTC, "FTC Testifies Before the House Energy and Commerce Subcommittee on its Work to Protect Consumers and Promote Competition," (May 8, 2019) available here.

This memorandum is provided by Skadden, Arps, Slate, Meagher & Flom LLP and its affiliates for educational and informational purposes only and is not intended and should not be construed as legal advice. This memorandum is considered advertising under applicable state laws.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Authors
Similar Articles
Relevancy Powered by MondaqAI
Reinhart Boerner Van Deuren s.c.
 
In association with
Related Topics
 
Similar Articles
Relevancy Powered by MondaqAI
Reinhart Boerner Van Deuren s.c.
Related Articles
 
Related Video
Up-coming Events Search
Tools
Print
Font Size:
Translation
Channels
Mondaq on Twitter
 
Mondaq Free Registration
Gain access to Mondaq global archive of over 375,000 articles covering 200 countries with a personalised News Alert and automatic login on this device.
Mondaq News Alert (some suggested topics and region)
Select Topics
Registration (please scroll down to set your data preferences)

Mondaq Ltd requires you to register and provide information that personally identifies you, including your content preferences, for three primary purposes (full details of Mondaq’s use of your personal data can be found in our Privacy and Cookies Notice):

  • To allow you to personalize the Mondaq websites you are visiting to show content ("Content") relevant to your interests.
  • To enable features such as password reminder, news alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our content providers ("Contributors") who contribute Content for free for your use.

Mondaq hopes that our registered users will support us in maintaining our free to view business model by consenting to our use of your personal data as described below.

Mondaq has a "free to view" business model. Our services are paid for by Contributors in exchange for Mondaq providing them with access to information about who accesses their content. Once personal data is transferred to our Contributors they become a data controller of this personal data. They use it to measure the response that their articles are receiving, as a form of market research. They may also use it to provide Mondaq users with information about their products and services.

Details of each Contributor to which your personal data will be transferred is clearly stated within the Content that you access. For full details of how this Contributor will use your personal data, you should review the Contributor’s own Privacy Notice.

Please indicate your preference below:

Yes, I am happy to support Mondaq in maintaining its free to view business model by agreeing to allow Mondaq to share my personal data with Contributors whose Content I access
No, I do not want Mondaq to share my personal data with Contributors

Also please let us know whether you are happy to receive communications promoting products and services offered by Mondaq:

Yes, I am happy to received promotional communications from Mondaq
No, please do not send me promotional communications from Mondaq
Terms & Conditions

Mondaq.com (the Website) is owned and managed by Mondaq Ltd (Mondaq). Mondaq grants you a non-exclusive, revocable licence to access the Website and associated services, such as the Mondaq News Alerts (Services), subject to and in consideration of your compliance with the following terms and conditions of use (Terms). Your use of the Website and/or Services constitutes your agreement to the Terms. Mondaq may terminate your use of the Website and Services if you are in breach of these Terms or if Mondaq decides to terminate the licence granted hereunder for any reason whatsoever.

Use of www.mondaq.com

To Use Mondaq.com you must be: eighteen (18) years old or over; legally capable of entering into binding contracts; and not in any way prohibited by the applicable law to enter into these Terms in the jurisdiction which you are currently located.

You may use the Website as an unregistered user, however, you are required to register as a user if you wish to read the full text of the Content or to receive the Services.

You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these Terms or with the prior written consent of Mondaq. You may not use electronic or other means to extract details or information from the Content. Nor shall you extract information about users or Contributors in order to offer them any services or products.

In your use of the Website and/or Services you shall: comply with all applicable laws, regulations, directives and legislations which apply to your Use of the Website and/or Services in whatever country you are physically located including without limitation any and all consumer law, export control laws and regulations; provide to us true, correct and accurate information and promptly inform us in the event that any information that you have provided to us changes or becomes inaccurate; notify Mondaq immediately of any circumstances where you have reason to believe that any Intellectual Property Rights or any other rights of any third party may have been infringed; co-operate with reasonable security or other checks or requests for information made by Mondaq from time to time; and at all times be fully liable for the breach of any of these Terms by a third party using your login details to access the Website and/or Services

however, you shall not: do anything likely to impair, interfere with or damage or cause harm or distress to any persons, or the network; do anything that will infringe any Intellectual Property Rights or other rights of Mondaq or any third party; or use the Website, Services and/or Content otherwise than in accordance with these Terms; use any trade marks or service marks of Mondaq or the Contributors, or do anything which may be seen to take unfair advantage of the reputation and goodwill of Mondaq or the Contributors, or the Website, Services and/or Content.

Mondaq reserves the right, in its sole discretion, to take any action that it deems necessary and appropriate in the event it considers that there is a breach or threatened breach of the Terms.

Mondaq’s Rights and Obligations

Unless otherwise expressly set out to the contrary, nothing in these Terms shall serve to transfer from Mondaq to you, any Intellectual Property Rights owned by and/or licensed to Mondaq and all rights, title and interest in and to such Intellectual Property Rights will remain exclusively with Mondaq and/or its licensors.

Mondaq shall use its reasonable endeavours to make the Website and Services available to you at all times, but we cannot guarantee an uninterrupted and fault free service.

Mondaq reserves the right to make changes to the services and/or the Website or part thereof, from time to time, and we may add, remove, modify and/or vary any elements of features and functionalities of the Website or the services.

Mondaq also reserves the right from time to time to monitor your Use of the Website and/or services.

Disclaimer

The Content is general information only. It is not intended to constitute legal advice or seek to be the complete and comprehensive statement of the law, nor is it intended to address your specific requirements or provide advice on which reliance should be placed. Mondaq and/or its Contributors and other suppliers make no representations about the suitability of the information contained in the Content for any purpose. All Content provided "as is" without warranty of any kind. Mondaq and/or its Contributors and other suppliers hereby exclude and disclaim all representations, warranties or guarantees with regard to the Content, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. To the maximum extent permitted by law, Mondaq expressly excludes all representations, warranties, obligations, and liabilities arising out of or in connection with all Content. In no event shall Mondaq and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use of the Content or performance of Mondaq’s Services.

General

Mondaq may alter or amend these Terms by amending them on the Website. By continuing to Use the Services and/or the Website after such amendment, you will be deemed to have accepted any amendment to these Terms.

These Terms shall be governed by and construed in accordance with the laws of England and Wales and you irrevocably submit to the exclusive jurisdiction of the courts of England and Wales to settle any dispute which may arise out of or in connection with these Terms. If you live outside the United Kingdom, English law shall apply only to the extent that English law shall not deprive you of any legal protection accorded in accordance with the law of the place where you are habitually resident ("Local Law"). In the event English law deprives you of any legal protection which is accorded to you under Local Law, then these terms shall be governed by Local Law and any dispute or claim arising out of or in connection with these Terms shall be subject to the non-exclusive jurisdiction of the courts where you are habitually resident.

You may print and keep a copy of these Terms, which form the entire agreement between you and Mondaq and supersede any other communications or advertising in respect of the Service and/or the Website.

No delay in exercising or non-exercise by you and/or Mondaq of any of its rights under or in connection with these Terms shall operate as a waiver or release of each of your or Mondaq’s right. Rather, any such waiver or release must be specifically granted in writing signed by the party granting it.

If any part of these Terms is held unenforceable, that part shall be enforced to the maximum extent permissible so as to give effect to the intent of the parties, and the Terms shall continue in full force and effect.

Mondaq shall not incur any liability to you on account of any loss or damage resulting from any delay or failure to perform all or any part of these Terms if such delay or failure is caused, in whole or in part, by events, occurrences, or causes beyond the control of Mondaq. Such events, occurrences or causes will include, without limitation, acts of God, strikes, lockouts, server and network failure, riots, acts of war, earthquakes, fire and explosions.

By clicking Register you state you have read and agree to our Terms and Conditions