{"id":792,"date":"2015-10-28T10:56:11","date_gmt":"2015-10-28T10:56:11","guid":{"rendered":"http:\/\/www.ftcguardian.com\/articles\/?p=792"},"modified":"2017-03-17T06:27:21","modified_gmt":"2017-03-17T06:27:21","slug":"9-ways-to-bulletproof-your-privacy-policy","status":"publish","type":"post","link":"https:\/\/www.ftcguardian.com\/articles\/9-ways-to-bulletproof-your-privacy-policy\/","title":{"rendered":"9 Ways To Bulletproof Your Privacy Policy"},"content":{"rendered":"<h1><span style=\"font-weight: 400;\">9 Ways To Bulletproof Your Privacy Policy<\/span><\/h1>\n<p>Is your privacy policy rock solid, or could it use some work? Mistakes can mean lawsuits, regulatory fines, and damage to corporate reputations. Here's how to protect your company.<\/p>\n<p><span style=\"font-weight: 400;\">Any company that collects, stores, and uses personal information should have a privacy policy. However, not all privacy policies are created equal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although many privacy policies may look the same, the riskiest ones fail to reflect what the company actually does. These can expose the organization to potential regulatory audits, fines, lawsuits, and reputational harm. To reduce the risks associated with such disconnects, businesses should spend more time thinking about &#8212; and operationalizing &#8212; their protection of sensitive data.<\/span><br \/>\n<a href=\"http:\/\/go.ftcguardian.com\/bw4uoy\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/s3.amazonaws.com\/ftcguardian\/images\/728x90-Un-vjy-FTC-GUARDIAN-banner-2.gif\"\/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">However, many organizations don't take their privacy policies seriously enough, as evidenced by the growing number of data breaches and the increasing amount of regulatory oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Toothless privacy policies are common. In June 2015, the <\/span><a href=\"https:\/\/otalliance.org\/system\/files\/files\/initiative\/documents\/2015_ota_online_trust_audit_honor_roll.pdf\"><span style=\"font-weight: 400;\">Online Trust Alliance (OTA) <\/span><\/a><span style=\"font-weight: 400;\">audited the security, privacy, and consumer protection practices of approximately 1,000 companies, all of which are the leading organizations in their respective industries. They included the top Internet retailers, banks, US federal government sites, social networking and sharing sites, news and media companies, Internet of Things providers, and OTA members. Forty-five percent failed to protect consumers and their data from harm and online threats. Forty-four percent made OTA's &#8220;Honor Roll&#8221; because they achieved a weighted score of 80 or better on a scale of 1\u2013100, based on 50 different data points. When the OTA <\/span><a href=\"http:\/\/www.otalliance.org\/2016-presidential-candidates-online-trust-audit\"><span style=\"font-weight: 400;\">audited the top 23 presidential candidates<\/span><\/a><span style=\"font-weight: 400;\"> in September 2015, it found that 74% failed because of their privacy policies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;The FTC has been very aggressively prosecuting companies that don't really do what they say or say what they do,&#8221; said Jim Adler, in an interview. &#8220;Where companies go sideways is not so much what they say, but whether they can live up to what they're saying.&#8221; Adler is chief security officer at big data analytics company <\/span><a href=\"https:\/\/metanautix.com\/\"><span style=\"font-weight: 400;\">Metanautix<\/span><\/a><span style=\"font-weight: 400;\"> and member of The Department of Homeland Security Data Privacy and Integrity Advisory Committee.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">To minimize your own company's risks, consider these nine pointers.<\/span><\/h2>\n<p><b>Don't Cut And Paste<\/b><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Using another company's privacy policy creates serious legal risks because that policy can be used against you,&#8221; said <\/span><a href=\"http:\/\/www.melniklegal.com\/\"><span style=\"font-weight: 400;\">Tatiana Melnik<\/span><\/a><span style=\"font-weight: 400;\">, attorney at law, in an interview. &#8220;If the FTC looks at what you're doing and it doesn't match your privacy policy, it will be used against you as being woefully negligent. And the courts will assume that you put something out there that you didn't read.&#8221;<\/span><\/p>\n<p><b>Involve The Right Players<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Aligning a privacy policy with a company's technology and business practices is challenging because it requires the involvement of the many stakeholders who are responsible for the data. Without that, there are knowledge gaps and security gaps that can expose the company to a number of unanticipated and unwanted outcomes.<\/span><\/p>\n<p><b>Keep It Simple<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There's a move to simplify privacy policies because they're too difficult for the average person to read and comprehend. Attention spans are short and privacy policies are long. Few people will take the time to read a document written in legalese and presented in a six-point type font. Because transparency is becoming a brand issue, some organizations are adopting a layered short notice, which presents privacy policy information in varying levels of detail: very short form; highlights; and the traditional full-blown document. Icons may also be used to simplify the communication of important points.<\/span><\/p>\n<p><b>Avoid Overly Broad Language<\/b><\/p>\n<p>How data can be used changes over time. One way of handling the uncertainty is to use overly broad language.<\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Companies are drafting overly expansive privacy policies that say they can do anything and everything with user's' data,&#8221; said Omer Tene, VP of research and education at the <\/span><a href=\"https:\/\/iapp.org\/\"><span style=\"font-weight: 400;\">International Association of Privacy Professionals<\/span><\/a><span style=\"font-weight: 400;\"> (IAPP), in an interview. &#8220;The FTC has increasingly looked critically at these practices, and might actually view them as being unfair trade practices, which is a basis for enforcement actions.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Privacy policies are about notice and consent. An overly broad policy can fail to provide adequate notice of the data that's being collected, stored, used, and shared, and for what purposes. On the flip side, consumers may claim they did not know what they were consenting to because the language was vague.<\/span><\/p>\n<p><b>Avoid Overly Narrow Language<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Knowing that broad language can fuel disputes, some companies opt to write privacy policies that are so specific, they backfire.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Drafting an overly restrictive policy might initially be seen as a good practice because you're constrained in your ability to use individuals' data,&#8221; said Omer Tene, VP of Research and Education at the International Association of Privacy Professionals (IAPP). &#8220;The FTC has been filing claims against companies that are not doing what they said in their privacy policies.&#8221; If you make your policy too narrow and end up going outside it, you could be punished, he said.<\/span><\/p>\n<p><b>Consider Information Flow<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Consumers are often asked whether they consent to information sharing with a company, the company and its partners, or other third parties. Despite what companies say, what they do may differ significantly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It's important to consider the entire flow of information and the potential parties that might touch the data, in order for you to ensure that privacy policies and practices are in sync. Issues can arise in mergers and acquisitions. In the <\/span><a href=\"http:\/\/www.infolawgroup.com\/2015\/06\/articles\/privacy-law\/radioshack-bankruptcy-case-highlights-value-of-consumer-data\/\"><span style=\"font-weight: 400;\">Radio Shack bankruptcy case<\/span><\/a><span style=\"font-weight: 400;\">, the sale of its 117 million customer records was a highly contentious issue involving several state attorneys general and corporations including Apple.<\/span><\/p>\n<p><b>Tie It To Security<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Effective privacy protection cannot be achieved in the absence of effective data security. Many security policies are penned with compliance in mind, rather than the protection of information assets, said Edward McNicholas, co-leader of the privacy, data security and information law practice at the law firm <\/span><a href=\"http:\/\/www.sidley.com\/\"><span style=\"font-weight: 400;\">Sidley Austin<\/span><\/a><span style=\"font-weight: 400;\">, in an interview. &#8220;Security is only as robust as the people who are involved in it, so you have to have appropriate education and training. If your employees are putting their passwords on sticky notes attached to their computer, it doesn\u2019t matter how sophisticated those passwords are.&#8221;<\/span><\/p>\n<p><b>Update The Policy<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A privacy policy shouldn't be a static document. Laws, statutes, regulations, technology, and cultural norms are changing all the time. Yet, a lot of privacy policies are out-of-date because they haven't been revisited often enough. If a discrepancy between privacy policies has been identified by a lawyer, a consultant, or the OTA, a common response is, &#8220;That's not what we do.&#8221; Craig Spiezle, president and executive director of the OTA recommends revisiting the privacy policy with the business groups once a quarter.<\/span><\/p>\n<p><b>Take It Seriously<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Privacy policies would have a better chance of being effective if protecting sensitive data was deemed to be <\/span><i><span style=\"font-weight: 400;\">everyone's<\/span><\/i><span style=\"font-weight: 400;\"> job in the company &#8212; an expected type of behavior.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem generally is a lack of consequences. Even though hacks, lawsuits, fines, and public outcries are growing in number, they still represent only a small percentage of all privacy policy breaches. In the absence of lawsuits, fines, public outcries, or other consequences, such as being reprimanded or fired, business as usual tends to chug along.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Privacy policies say all kinds of nice things like, &#8216;We will not leak our user data.' They don't say we will ensure that our on-site and off-site backups are encrypted at all times and not left on a disk drive next to the coffee machine. A great question to ask yourself is, &#8216;Or else what?'&#8221; said Walter O'Brien. &#8220;All these policies don't have any teeth because they don't have an &#8216;Or else what?' and if there's &#8216;<\/span><i><span style=\"font-weight: 400;\">No<\/span><\/i><span style=\"font-weight: 400;\"> else what,' it doesn't matter.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">***<\/span><span style=\"font-weight: 400;\">Lisa Morgan is a freelance writer who covers big data and BI for InformationWeek. She has contributed articles, reports, and other types of content to various publications and sites ranging from SD Times to the Economist Intelligent Unit. Frequent areas of coverage include big data, mobility, enterprise software, the cloud, software development, and emerging cultural issues affecting the C-suite.<\/span><\/p>\n<p><a href=\"http:\/\/www.informationweek.com\/author-bio.asp?author_id=2250\"><span style=\"font-weight: 400;\">http:\/\/www.informationweek.com\/author-bio.asp?author_id=2250<\/span><\/a><\/p>\n<h2><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">Here\u2019s How To Make Sure You,<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Your Business & Website Is FTC Compliant<\/span><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">By now it should be clear how important it is for you to be FTC compliant. But how can you do that without spending $7,500-$8,000 or more on Internet Attorneys?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Smart business owners around the world are doing it with the help of <\/span><span style=\"font-weight: 400;\">FTC Guardian<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">FTC Guardian is a service that is 100% focused on helping to keep you get and stay FTC compliant and fully protected. <a href=\"https:\/\/go.ftcguardian.com\/bw4uoy\" target=\"_blank\">And right now, we are offering a free training to give you the knowledge, information, and guidance that you need to stay out of trouble with the Federal Trade Commission.<\/a><\/p>\n<p>The training is titled: <a href=\"https:\/\/go.ftcguardian.com\/bw4uoy\" target=\"_blank\"><strong>3 Tragic (Legal) Privacy Policy List Building Mistakes That Can Get You In Hot Water With The FTC Today &#8211; Resulting In Your Business Being Shut Down&#8230; And How To Solve It!<\/strong><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of the things you\u2019ll discover on the training:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Real-Life Examples of People Who Didn\u2019t Think They Were At Risk, But Who Got Nailed By The FTC, And Why It Could Happen To You, Too<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\">Why 2014 Was a Significant Year For Online Businesses, And Why You Should Be Worried!<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\">The 3 Enormous Powers The FTC Has That Can Change Your Life \u2013 And Your Family\u2019s Life \u2013 Forever!<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How to Avoid FTC Claims When Collecting Leads With Optin Forms<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\">3 Privacy Policy Mistakes Every Digital Marketer Is Making, And Why You're In The FTC\u00a0Crosshairs.<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">And Much More\u2026<\/span><\/li>\n<\/ul>\n<p><b>Remember: legal protection is a massively important part of your business, and it\u2019s one you cannot afford to ignore any longer.<\/b><\/p>\n<p><a href=\"https:\/\/go.ftcguardian.com\/bw4uoy\" target=\"_blank\">Go here to register for our next FREE training and make your business is FTC compliant today!<\/a><\/p>\n<p><b>Disclaimer: \u00a0This article is provided for informational purposes only. It\u2019s not legal advice, and no attorney-client relationship is created. Neither the author nor FTC Guardian, Inc. is endorsed by the Federal Trade Commission.<\/b><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your privacy policy rock solid, or could it use some work? Mistakes can mean lawsuits, regulatory fines, and damage to corporate reputations. Freelance writer Lisa Morgan explores &#8216;9 Ways to Bulletproof Your Privacy Policy.  <\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_analytify_skip_tracking":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-792","post","type-post","status-publish","format-standard","hentry","category-ftc-compliance"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/posts\/792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/comments?post=792"}],"version-history":[{"count":3,"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/posts\/792\/revisions"}],"predecessor-version":[{"id":799,"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/posts\/792\/revisions\/799"}],"wp:attachment":[{"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/media?parent=792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/categories?post=792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ftcguardian.com\/articles\/wp-json\/wp\/v2\/tags?post=792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}