The European Commission released its first annual review of the current EU-US Privacy Shield in order to determine what may or may not need changes as a matter of policy. As it currently stands, the Privacy Shield creates enforceable protections for European Union residents regarding the use of their personal data. The US-based entities that wish to participate will have to conform to greater transparency standards in how the data is used, as well as submitting to strong oversight to ensure adherence, and increased cooperation with Data Protection Authorities (“DPAs”). So, what changes are suggested in this new report? How might this affect businesses in the United States? What consequences, if any, may be added to the new changes?

What is the review?

It was conducted by the Commission to the European Parliament, which in essence reviewed the function of the Privacy Shield and gathered input from publicly-available sources. These sources combined press releases as well as legal cases that were available to the Commission; although, neither source was cited specifically within the seven-page report. The Commission is composed of both European and American representatives, such as the European Data Protection Supervisor and Federal Trade Commission.

In general, internet commerce transpires on the national and international levels. Naturally, data protection is an important concern for private and public agencies.  The European Union’s remaining members are currently in the process of another process to protect data with the “General Data Protection Regulation” (GDPR) set to take effect next year. This differs from the previous Privacy Shield in some respects, as it is broader, and expands beyond the European Union and deals with any individual that may have a shred of a connection to the European Union. So, what is GDPR? What does it require? Also, what are the consequences for non-compliance?

What is the GDPR?

The GDPR grants the following as rights to a data subject (i.e., a user): breach notification; right to access a copy of personal data free of charge in electronic format; right to be forgotten; data portability, allowing transmission to another provider; privacy by design for systems; and data protection officers in cases where constant monitoring of data subjects on a large scale may occur, or for special categories of data regarding criminal convictions.

Now, by closing out this month and a deep dive into the future of copyright law comes a slightly more obscure reference to a recent change we’ve covered previously. Namely, what is, and what is not, protected under copyright when it comes to clothing? We now know that cheerleading uniforms are protected. However, what about bananas? An odd question, but one that the courts will be looking at as a recent case has been filed regarding the design and sale of banana costumes and has prompted questions in a Post-Star Athletica world. Is this the limit to Star Athletica? Has Justice Sotomayor’s comment about killing knockoffs come true already? Is it possible that the follow-up question to Star Athletica may be a banana battle?

The Now-Settled Case

The now-settled case was between Rasta Imposta, and Kmart, which is a subsidiary of Sears. Rasta Imposta had sold a banana costume and had good business relations with Kmart until Kmart notified Rasta Imposta that it would not be purchasing its costumes any longer.

In general, parody is a well-tested defense to copyright infringement claims. For example, legal cases involving Barbie Girls and Pretty Women have hammered in the points quite definitively, though the question of what exactly is parody has persisted throughout the years.  Generally, it would be seen as something that ridicules the original work.  So, using the comical characters from the Game of Thrones to ridicule the current state of politics is probably fair use.

Recently, the question has popped up with a new and stranger answer that makes the situation complex. What is this potential new parody standard? How has it changed with time? Does this new standard go where it has never gone before?

The lawsuit

Following in the theme of “advances in copyright law,” there is an additional snag that seems to occur every now and then. Who owns a picture of you? Naturally, a person may say: “Well, that is a picture of me, and if someone is selling it, or making money from it, then I own it and should be profiting as well.” We can extend this abstraction even further. A tattoo artist creates a design for a famous person, and with that person’s appearance on a film, or a video game, the tattoo artist demands payment. The famous person may say: “But it was a tattoo on my body. Why should I be forced to pay?” Ultimately, it comes to a two-fold situation: First, who is the author? Second, was there a license granted to make it acceptable?

What is authorship?

The first item to determine is authorship. In copyright, one does not necessarily have to be the one who “creates” the work to own the copyright. There are contracts known as “works-for-hire” agreements that can infuse ownership and authorship towards a legal entity. This would mean the legal entity (e.g., corporation, LLC) would be the author and able to file suit under the Copyright Act.

In general, copyright lawsuits can be expensive. They require a lawyer who is well-versed with the copyright laws and federal court system. Yet, any creator or owner of copyright knows that the real scourge tends to happen with piracy. In some instances, no alterations, no messy facts, and no major damages can make it easier to recoup litigation costs. However, Hakeem Jeffries, who is the Representative for New York’s 8th Congressional District, has acknowledged the issue, prompting another round to get legislation passed starting this year. So, what is in the law? What is the possible effect? Why would this be more beneficial to a copyright holder?

What is a Small Copyright Claim?

The idea is simple and has been thrown around since 2013.  It is an expedited and limited system for copyright claims, akin to small claims courts that exist in state courts. This system would allow copyright holders to affordably pursue claims of up to $30,000, seek declarations of non-infringement, or DMCA claims under 17 U.S.C. 512(f). Also, the officers in this system would be different from federal judges and would be required to have experience in copyright laws and alternative dispute resolution.

A question for you to consider: Imagine a world where music is created by a random set of numbers. Who owns the music? Is it the programmer? Is it the user who gave specifications for the music? It’s certainly an odd question to ask, and unsurprisingly, one without a clear answer. The question has been mostly unlitigated, although programs such as the Artificial Intelligence (“AI”) made by DeepMind can produce music by listening to it.  For example, some programs can restore or create mimics of Rembrandt. One might wonder: With the increasing role of technology, what are the limits to copyright laws? Who is a creator, and hasn’t this issue already been settled in courts?

Previous Litigation

To determine the possibility of authorship to AI, it’s important to simplify things. Technology is a little complex. What about monkeys, animals, or something that occurs naturally?

As the Equifax breach continues to become a complicated issue, certain lessons can be learned for other businesses handling personal information. Namely, what not to do in their business operations?  In the wake of the cybersecurity breach, it had been reported that Equifax was aware of the security gaps, and did nothing to remedy them. So, where exactly did Equifax go wrong in its data security plans? How was it informed about the open holes in its security infrastructure?  What can a business owner do to avoid becoming an encore of Equifax’s folly? Is there any way to determine gaps in security policies and procedures?

Where did Equifax go wrong?

Effectively, Equifax appears to have failed at multiple levels, resulting in this breach. This is best summarized into one large mistake. There were no updates implemented to the computer systems Equifax used on its networks.  This was due to a delayed response to a known vulnerability in the Apache Struts web application. This framework is well known, it is used in the business community, and is an open-source framework for developing Java applications. In short, the delay was exasperated by the company’s failure to detect the vulnerability during a security scan.

As the Equifax breach has developed recently, another issue has come up, namely the arbitration provision within its website, which has caused consumer outrage and confusion. So, why does this provision matter? If consumers want to get their credit frozen, or check to see if they were affected, surely Equifax wouldn’t add insult to injury to the consumers who are suffering from its mistakes. Certainly, it would appear to be bad business to do so, or at least, unwanted attention. However, Equifax cannot be said to avoid adding insult to injury. Instead, Equifax has implemented that arbitration provision, and later removed it. So again, why would Equifax implement this provision? What impact might it have on the consumer? Why might this be important for businesses everywhere to observe?

What is the arbitration provision?

The arbitration provision that had insulted many consumers was attached to Equifax’s offer of free credit monitoring. In exchange for the service being performed (after the security breach) Equifax demanded that consumers settle any dispute with them through arbitration. In general, arbitration is a private and less costly way to settle disputes outside of the courtroom. While the results of the arbitration may be binding, it gives broader latitude to discovery, time, and may be faster and less formal than a formal trial.  While Equifax later clarified this provision would not apply to the current breach, however, nevertheless consumers were upset at the revelation.

Let us move on to the ways to protect ourselves in the future by using a credit freeze or fraud alert.  These options can protect your personal, private, and confidential information after a security breach and effectively add extra protection against identity theft. We have discussed them briefly in the past, although now, it seems appropriate to dive into further analysis. What are credit freezes and fraud alerts? How do they add more protection against identity thieves? What other actions might someone take to create additional safeguards?

Credit Freeze

The first and most basic way to prevent harm from identity theft is through a credit freeze, also known as a security freeze. A credit freeze is more or less what it sounds like–i.e., it “freezes” your credit where no lender can get access to your credit unless the consumer decides to lift it. Even then, the freeze cannot be undone without a pin number issued at the time of the freeze.