Data Protection & Privacy 2024 Comparisons

Last Updated March 12, 2024

Contributed By Fieldfisher

Law and Practice

Author



Fieldfisher is a European law firm with market-leading practices in many of the world’s most dynamic sectors. The firm is a forward-thinking organisation with a particular focus on technology, financial services, energy and natural resources, and life sciences. Fieldfisher chooses a collaborative approach with an intense focus on the end-user, and carefully considers how to shape its services to add the most value to its clients. Many of Fieldfisher’s lawyers are widely respected thought leaders, digging deep into the issues that matter most to their clients and providing answers and opinions, not just legalese. The firm’s growing European network of offices supports an international client base alongside strategic bases in Silicon Valley and China.

Constitutional Rights

The United States Constitution does not explicitly include a right to privacy. The Bill of Rights does, however, protect certain aspects of privacy. For example:

  • the First Amendment protects the privacy of beliefs;
  • the Third Amendment protects the privacy of the home against the quartering of soldiers in private homes without the consent of the home’s owner;
  • the Fourth Amendment prohibits unreasonable searches and seizures; and
  • the Fifth Amendment creates rights relevant to both criminal and civil legal proceedings.

Moreover, the Ninth Amendment provides that the enumeration of certain rights in the Bill of Rights cannot deny the existence of other rights. Some commentators interpret the Ninth Amendment as affirming the existence of rights outside those expressly protected by the Bill of Rights. Finally, certain decisions appear to indicate that the right to privacy, especially in marital relations, is part of the liberty interest of the 14th Amendment.

Sector-Specific Data Protection Legislation

There is currently no single, all-encompassing federal legislation covering privacy and the protection of personal information generally in the USA. Instead, legislation at the federal level primarily protects data in specific sectors (such as healthcare, education, communications and financial services) or, in the case of online data collection, that of children. Examples of such laws include the following:

  • the Fair Credit Reporting Act 1970 (FCRA) and the Fair and Accurate Credit Transactions Act of 2003 (FACTA) protect the information collected by consumer reporting agencies, restrict the use of information relating to the creditworthiness of an individual, protect consumers against identity theft and improve the accuracy of consumers’ credit records;
  • the US Privacy Act of 1974, which established important rights and restrictions on data held by US government agencies;
  • the Family Educational Rights and Privacy Act of 1974 (FERPA), which protects the privacy of student education records;
  • the Electronic Communications Privacy Act of 1986 (ECPA), which places restrictions on access to certain electronic communications by the US government when the communications are in storage or in transit;
  • the Video Privacy Protection Act of 1988 (VPPA), which applies to videotape service providers (and has since been interpreted as also applying to certain digital video or online streaming services);
  • the Telephone Consumer Protection Act of 1991 (TCPA), which places restrictions on telemarketing calls and the use of automatic telephone dialling systems;
  • the Telemarketing and Consumer Fraud and Abuse Prevention Act of 1994 (TCFAPA), which protects consumers from telemarketing deception and abuse;
  • the Health Insurance Portability and Accountability Act of 1996 (HIPAA), which applies to health data held by covered entities or business associates, and the Health Information Technology for Economic and Clinical Health Act 2009 (HITECH), which addresses privacy, security and breach notification issues related to individual’s protected health information;
  • the Children’s Online Privacy Protection Act of 1998 (COPPA), which imposes requirements on website platforms or online services that are directed at children under the age of 13 years;
  • the Gramm-Leach-Bliley Act of 1999 (GLBA), which governs the protection of personal information handled by banks, insurance companies and other companies in the financial service industry – among other requirements, it requires financial institutions to be transparent about their information-sharing practices to their customers and to protect sensitive data that they hold; and
  • the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM), which protects consumers from deceptive commercial emails and requires the implementation of opt-out mechanisms.

The sectoral approach adopted by US federal law to address privacy and data protection means that each state may enact its own laws governing privacy and data protection. As a result, privacy requirements differ from state to state, and cover different areas. Where a federal statute covers a specific topic, it may pre-empt a similar state law on the same topic.

The Federal Trade Commission

The Federal Trade Commission (FTC) is an independent US law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits “unfair or deceptive practices” in the marketplace. The FTC has taken the view that “unfair or deceptive practices” include, for example, a company’s failure to adhere to its own published privacy notice and the company’s failure to provide an adequate level of security for the personal information it holds, as well as the use of deceptive marketing practices. If a company violates an FTC order, the FTC can seek civil monetary penalties for the violations. The FTC can also seek civil monetary penalties for violations of certain privacy statutes and rules. This broad authority allows the FTC to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models.

The FTC

In addition to its authority to take action against deceptive or unfair trade practices (as described in 1.1 Laws), the FTC has the authority to enforce several sector-specific laws, which include the CAN-SPAM Act, COPPA, the FCRA and the TCFAPA, among others. Since the FTC’s enforcement actions nearly always result in settlement agreements with companies, the contents of those agreements are used by companies looking for guidance in developing privacy practices.

The FTC may start an investigation on its own based on publicly available information, at the request of another agency, or based on complaints from consumers or competitors.

Other Agencies

Other agencies at the federal and state levels, as well as state consumer protection regulators (usually the state Attorneys General), may also exercise regulatory authority in relation to privacy. At the federal level, examples include:

  • the Office of the Comptroller of the Currency;
  • the Department of Health and Human Services;
  • the Federal Communications Commission;
  • the Securities and Exchange Commission;
  • the Consumer Financial Protection Bureau; and
  • the Department of Commerce.

The State of California has created an agency with full administrative power dedicated to privacy and data protection, the California Privacy Protection Agency (CPPA), which is unprecedented in the United States – see below for more details.

State Attorneys General

State Attorneys General have the power to bring enforcement actions based on unfair or deceptive trade practices. The sources of these powers are typically state laws prohibiting “unfair or deceptive acts and practices” and authorising the state Attorney General to initiate enforcement actions.

Recent privacy events have seen increased co-operation and co-ordination in enforcement among state Attorneys General, whereby multiple states will jointly pursue actions against companies that experience data breaches or other privacy allegations. Co-ordinated actions among state Attorneys General often exact greater penalties from companies than would typically be obtained by a single enforcement authority.

California Privacy Protection Agency

In November 2020, voters in the State of California approved Proposition 24, also known as the California Privacy Rights Act of 2020 (CPRA). The CPRA added new privacy protections to the existing California Consumer Privacy Act of 2018 (CCPA) and created a new agency, the California Privacy Protection Agency (CPPA), to implement and enforce the CCPA (as amended by the CPRA). The CPPA may bring enforcement actions related to the CCPA. The California Attorney General retains civil enforcement authority over the CCPA.

In addition, the CPPA has been given the power to adopt regulations under the CCPA, including rules that further implement consumers’ rights and the responsibilities of businesses with the goal of strengthening consumer privacy. The CPPA has already adopted CCPA regulations, with further regulations on the way. The CPPA has so far announced two major settlements as a result of its enforcement actions:

  • the first in August 2022, requiring Sephora to pay USD1.2 million in penalties, on the basis that the company allegedly did not disclose to consumers that it was selling their personal information or process user requests to opt out of sale via user-enabled global privacy controls in violation of the CCPA; and
  • the second in February 2024, requiring DoorDash to pay USD375,000 on the basis that the company allegedly sold personal information under the CCPA and did not disclose such transfer of personal information.

Adjudication

The FTC determines in an adjudicative proceeding whether a practice violates the law. As mentioned previously, pursuant to Section 5(b) of the FTC Act, the FTC may challenge “unfair or deceptive” acts or practices. When the FTC has “reason to believe” that a violation of the law has occurred, the FTC may issue a complaint setting forth its charges. If the respondent elects to settle the charges, it may sign a consent agreement (without admitting liability), consent to entry of a final order, and waive all right to judicial review. If the FTC accepts the proposed consent agreement, it places the order on the record for 30 days of public comment (or for such other period as the FTC may specify) before determining whether to make the order final.

Enforcement

An FTC order generally becomes final (ie, binding on the respondent) 60 days after it is served, unless the order is stayed by the FTC or by a reviewing court. Divestiture orders become final after all judicial review is complete (or if no review is sought, after the time for seeking review has expired). If a respondent violates a final order, it is liable for a civil penalty for each violation. The penalty is assessed by a federal district court in a suit brought to enforce the FTC’s order.

Where the FTC has determined in a litigated administrative adjudicatory proceeding that a practice is unfair or deceptive, and has issued a final cease-and-desist order, the FTC may obtain civil penalties from non-respondents who thereafter violate the standards articulated by the FTC. To accomplish this, the FTC must show that the violator had “actual knowledge that such act or practice is unfair or deceptive and is unlawful” under Section 5(a)(1) of the FTC Act. To prove “actual knowledge”, the FTC typically shows that it provided the violator with a copy of the FTC’s determination about the act or practice in question, or a “synopsis” of that determination.

Global CBPR Forum

The USA participates in the Asia-Pacific Economic Cooperation’s (APEC) Cross-Border Privacy Rules (CBPR) system. In April 2022, the US Department of Commerce Secretary Gina Raimondo announced a key development in international collaboration with the newly created Global Cross-Border Privacy Rules Forum (the “Global CBPR Forum”). Participant countries include Canada, Japan, the Republic of Korea, the Philippines, Singapore and Chinese Taipei. In August 2022, the Australian government announced that Australia had joined the Global CBPR Forum. In July 2023, the Global CBPR Forum announced that it welcomed the United Kingdom (UK) as an Associate, further expanding participation in the Global CBPR Forum outside the Asia-Pacific region.

According to the Global CBPR Declaration, the framework establishes a certification system to help companies in participating jurisdictions demonstrate compliance with internationally recognised privacy standards, with the aim of fostering interoperability and international data flows. The Global CBPR Forum will replace the existing APEC Cross-Border Privacy Rules (APEC CBPR) and Privacy Recognition for Processors (PRP) certification systems, enabling non-APEC countries to participate.

Transfers From the EEA: the Privacy Shield and SSCs

Data transfer from the European Economic Area (EEA) towards countries outside the EEA may only occur if they offer an “adequate” level of data protection, which generally means a level equivalent to the EU General Data Protection Regulation (GDPR).

On 4 June 2021, the European Commission issued an updated set of SCCs for data transfers from controllers or processors located in the EEA (or otherwise subject to the GDPR) to controllers or processors established outside the EEA (and not subject to the GDPR). Since then, there have been decisions, such as from the Austrian or French data protection authorities in relation to Google Analytics, which have invalidated certain data transfers from the EEA to the USA due to concerns surrounding the potential accessibility of the data by intelligence services.

After nearly two years of negotiations, on 25 March 2022 the United States and the European Commission announced the Trans-Atlantic Data Privacy Framework, designed to address the concerns raised by the Court of Justice of the European Union when, in 2020, it struck down the Commission’s adequacy decision underlying the EU-US Privacy Shield framework. In particular, under the proposed framework, the United States made commitments to:

  • strengthen the privacy and civil liberties safeguards governing US signals intelligence activities;
  • establish a new redress mechanism with independent and binding authority; and
  • enhance its existing rigorous and layered oversight of signals intelligence activities.

Following such announcement, on 7 October 2022 President Biden signed an Executive Order to implement the EU-US Data Privacy Framework. Among other things, the new framework will allow individuals in the EU to seek redress through an independent Data Protection Review Court made up of members outside the US government. That body “would have full authority to adjudicate claims and direct remedial measures as needed”. In addition, the Executive Order provides that US signals intelligence activities may only be conducted following a determination that they are “necessary to advance a validated intelligence priority”, and “only to the extent and in a manner that is proportionate to the validated intelligence priority for which they have been authorised”. The Executive Order also specifies certain “legitimate objectives” and “prohibited objectives” for which US signals intelligence activities may be carried out. The Executive Order also requires US intelligence agencies to review their policies and procedures to implement these new safeguards.

The adequacy decision on the EU-US Data Privacy Framework was adopted by the European Commission on 10 July 2023. This decision concludes that the United States ensures an adequate level of protection, comparable to that of the EU, for personal data transferred from the EU to US companies participating in the EU-US Data Privacy Framework.

A number of non-governmental organisations (NGOs) in the USA are focused on privacy and data protection issues, including the following.

  • The BBB National Programs is the US advertising industry’s self-regulatory body. It oversees more than a dozen national industry self-regulation programmes that set standards for the advertising and privacy practices of businesses.
  • The Office of Government Information Services (OGIS) is a Freedom of Information Act resource for use by consumers and the US government. The US Congress has empowered the OGIS to review the policies and procedures for responding to Freedom of Information Act requests and for assisting with improving compliance from federal agencies (it also assists in resolving request disputes between federal agencies and consumers).
  • The American Society of Access Professionals was formed by federal government employees and private citizens as a forum to connect government Freedom of Information Act and Privacy Act personnel with information requestors.
  • The Electronic Privacy Information Center (EPIC) is a public-interest research centre based in Washington, DC, which publishes resources on privacy, free speech and other civil liberties.
  • The Privacy Rights Clearinghouse is a non-profit consumer information platform, which offers consumers resources and information to help them protect their personal information.

The USA and the EU have a fundamentally different approach to privacy law. Generally, the EU member states view privacy as a fundamental human right and freedom. In particular, Article 8 of the EU Charter of Fundamental Rights proclaims that “everyone has the right to the protection of personal data concerning him or her”, and also that “everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified”. In addition, even before the GDPR was adopted, the European approach was to use a comprehensive or omnibus approach to data protection law, where an overarching law covers the collection of all information and data relating to all EU data subjects.

By contrast, the US Constitution contains no express right to privacy. Moreover, rather than create an overarching privacy regulation, the USA has enacted various privacy laws as and when a need for them arises, based on a sectoral approach. As discussed in 1.1 Laws, there are a number of laws covering specific sectors – for example:

  • health information is regulated under HIPAA;
  • financial information is regulated under the GLBA and FCRA; and
  • marketing can be regulated under the TCPA or CAN-SPAM regulations.

Moreover, information relating to an individual is typically referred to as “personally identifiable information” (PII) or “personal information”, in contrast to the concept of “personal data” found in the European framework. Under US law, the scope of PII or personal information is not uniform as the information protected varies across legislation and state. In particular, certain types of data may be protected for a given purpose under a specific framework, but not for another. Personal data, in the context of the GDPR, covers a much wider range of information than PII. In other words, all PII is personal data but not all personal data is PII.

In the absence of a comprehensive federal legislation regulating data privacy, the United States has taken a patchwork approach, with each individual state being able to enact its own set of rules – and several states have already done so. Between 2020 and 2022, the states of California, Virginia, Colorado, Connecticut and Utah passed comprehensive state privacy laws. In 2023, an additional eight states enacted comprehensive state privacy laws (Iowa, Indiana, Tennessee, Montana, Texas, Florida, Delaware and Oregon) which are scheduled to take effect between July 2024 and January 2026. There is a real potential to see each state in the USA creating its own set of privacy rules, just as each US state has its own rules in relation to data breach notification – indeed, all 50 states in the USA have their own data breach reporting laws, and they all have different requirements for determining whether a breach has occurred and for the notices that are required.

A number of key developments have taken place in the past 12 months affecting US businesses, as described throughout this chapter. See in particular 1.4 Multilateral and Subnational Issues in relation to developments on cross-border data transfers. Other significant developments include the following.

UK Transfers

In September 2023, the UK government announced the launch of the UK-US data bridge, thereby recognising the USA as offering an adequate level of data protection where the transfer is to a US organisation that:

  • is listed on the EU-US Data Privacy Framework; and
  • participates in the UK Extension to the DPF.

Supporting this decision, on September 18th the US Attorney General designated the UK as a “qualifying state” under Executive Order 14086. This will allow all UK individuals whose personal data has been transferred to the USA under any transfer mechanisms (ie, including those set out under UK GDPR Articles 46 and 49) access to the newly established redress mechanism if they believe that their personal data has been accessed unlawfully by US authorities for national security purposes.

State Legislation

The California Consumer Protection Act, as amended by the California Privacy Rights Act

In November 2020, voters in the State of California approved Proposition 24, also known as the California Privacy Rights Act (CPRA), which went into effect on 1 January 2023. The CPRA amends and expands the existing California Consumer Protection Act of 2018 (CCPA). In particular, the CPRA created the California Privacy Protection Agency (CPPA), which has the authority to bring an administrative enforcement action against businesses that violate the CCPA or the CPRA. The attorney general retains enforcement authority over the CCPA or the CPRA.

The Virginia Consumer Data Protection Act

On 2 March 2021, the Virginia Consumer Data Protection Act (VCDPA) was signed into law and became effective on 1 January 2023. This made Virginia the second state to enact a consumer privacy and data security law, following in the footsteps of California.

The VCDPA grants Virginia consumers the rights to access, correct, delete, know and opt out of the sale and processing for targeted advertising purposes of their personal information, similar to the CCPA and CPRA. However, the VCDPA is not a replica of the CPRA; instead, it takes inspiration from the GDPR in a few key areas. For example, it requires covered organisations to perform Data Protection Assessments (not to be confused with Data Protection Addendums) which resemble the GDPR’s Data Protection Impact Assessments (DPIAs), and the VCDPA further adopts similar terminology to that used in the GDPR (ie, “controller” and “processor”). The Attorney General may initiate actions and fines of USD7,500 per violation of the VCDPA. There is no private right of action for consumers under the VCDPA.

The Colorado Privacy Act (CoPA)

Similar to the VCDPA, CoPA’s definition of consumers does not include individuals acting in commercial or employment contexts. Instead, it is designed to protect the “consumer”, defined in CoPA as “an individual who is a Colorado resident acting only in an individual or household context; and does not include an individual acting in a commercial or employment context, as a job applicant, or as a beneficiary of someone acting in an employment context”. Importantly, CoPA also uses similar terminology to the GDPR (ie, “personal data”, “controller” and “processor”).

Among other things, CoPA grants consumers the following:

  • the right to opt out of data processing for targeted advertising, sale or profiling using their personal data;
  • the right to access any data that a company has collected about them;
  • the right to have any data corrected that has been collected about them and is incorrect or outdated;
  • the right to have any data collected about them deleted; and
  • the right to data portability (being able to have their data transferred to another entity).

Connecticut’s Data Privacy Act

On 10 May 2022, Governor Ned Lamont signed Senate Bill 6, An Act Concerning Personal Data Privacy and Online Monitoring (CDPA) into law. The law became effective on 1 July 2023.

The CDPA includes many of the same rights, obligations and exceptions as the data privacy laws in California, Colorado and Virginia. It draws heavily from CoPA’s law and the VCDPA, with many of the law’s provisions either mirroring or falling somewhere between CoPA and the VCDPA, but contains a few notable distinctions that should be factored into an entity’s compliance efforts. 

Utah’s Consumer Privacy Act

In March 2022, Governor Spencer Cox signed the Utah Consumer Privacy Act (UCPA) into law, which takes inspiration from the VCDPA, CoPA and CPRA. It entered into effect on 31 December 2023.

Contrary to the CPRA, VCDPA or CoPA, the UCPA does not grant individuals the right to opt out of profiling or the right to correct inaccuracies in their data.

US State Privacy laws entering into effect in 2024

On 1 July 2024, Florida’s Digital Bill of Rights, Oregon’s Consumer Privacy Act, and Texas’ Data Privacy and Security Act take effect. On 1 October 2024, Montana’s Consumer Data Privacy Act takes effect. While these laws share similarities with the other privacy state laws that have been introduced, they are not identical.

Here are some of the highlights of these new state laws.

  • The Florida Digital Bill of Rights has a limited jurisdictional scope: it primarily applies to businesses with an annual global revenue exceeding USD1 billion. In addition to providing for consumer privacy rights that have now become a standard in the recent US state privacy laws (eg, the right to confirm that their personal data is being processed, the right of access/obtaining a copy of their personal data, the right of correction, the right of deletion and the right to opt out of the sharing of their data for targeted advertising purposes), the Florida Digital Bill of Rights grants consumers the right to opt out of the collection of their personal information through voice or facial recognition features. Finally, for providers of an online service, product, game, or feature likely to be predominantly accessed by individuals under the age of 18, the bill:
    1. prohibits processing personal information that “may result in substantial harm or privacy risk to children”;
    2. limits profiling of individuals under the age of 18 unless certain conditions are met; and
    3. restricts collecting, selling, sharing, using and retaining personal information and precise geolocation data of individuals under the age of 18.
  • Oregon’s Consumer Privacy Act does not have a threshold based on an entity’s annual revenue. This law applies to organisations that conduct business in Oregon or that provide products or services to Oregon residents, and that during a calendar year control or process the personal information of at least 100,000 Oregon residents or control or process the personal information of 25,000 Oregon residents and derive more than 25% of their gross revenue from selling personal information.
  • Texas’ Data Privacy and Security Act does not have any threshold based on annual revenue thresholds or volume of data processed to determine applicability, contrary to most other US state privacy laws. However, Texas’ Data Privacy and Security Act provides an exemption for small businesses, as defined by the US Small Business Administration, unless they sell sensitive data, in which case they must obtain consumer consent in advance. Texas’ Data Privacy and Security Act will require covered businesses to recognise universal opt-out mechanisms for the sale of personal data and targeted advertising in 2025.
  • Montana’s Consumer Data Privacy Act is similar to Oregon’s Consumer Privacy Act as it also does not have a revenue threshold. The law applies to businesses that conduct business in the state or that produce products or services targeted to state residents, and that control or process the personal data of at least 50,000 Montana residents or control or process the personal information of 25,000 Montana residents and derive more than 25% of their gross revenue from selling personal data.

Significant pending changes, hot topics and issues on the horizon over the next 12 months include the following.

Several states had their state privacy law enter into effect during 2023, namely California (ie, the CPRA, which updates the CCPA), Virginia, Colorado, Connecticut and Utah.

As mentioned in 1.7 Key Developments, 2024 is the year when additional state privacy laws enter into effect: on 1 July 2024, Florida’s Digital Bill of Rights, Oregon’s Consumer Privacy Act, and Texas’ Data Privacy and Security Act take effect; and on 1 October 2024, Montana’s Consumer Data Privacy Act takes effect. 

Additional state privacy laws are scheduled to take effect in 2025 – for example:

  • the Delaware Personal Data Privacy Act will enter into effect on 1 January 2025;
  • the Iowa Act Relating to Consumer Data Protection will enter into effect on 1 January 2025;
  • the New Jersey Privacy Act will enter into effect on 15 January 2025; and
  • the Tennessee Information Protection Act will enter into effect on 1 July 2025.

The list will likely only get bigger as more states are also expected to adopt their own privacy laws. In turn, the enactment of various state privacy laws is likely to increase pressure to enact a comprehensive US federal privacy law, as organisations grapple to comply with the requirements of the various state laws, each imposing slightly different requirements.

As mentioned in 1.1 Laws, there is currently no federal legislation protecting personal information generally across the country. Rather, there are many laws at the federal level protecting personal information in specific sectors; and, in addition, the various privacy laws enacted at state level must be taken into account.

The State of California has traditionally taken a leadership role in the USA in relation to cybersecurity and the protection of the personal information of California residents. For example, California was one of the first states in the nation to provide an express right of privacy in the California Constitution, giving each citizen an “inalienable right” to pursue and obtain “privacy”. In 2002, California was also the first US state to enact a data breach notification law requiring organisations to notify all impacted individuals “in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement”, whenever information relating to a California resident may have been compromised.

The CCPA was the first state-level omnibus privacy law imposing broad obligations on businesses to provide state residents with transparency and control over their personal information. The CPRA, which entered into effect in January 2023, amends and further extends the CCPA’s requirements. Since the CCPA was introduced, other states have introduced their own state privacy laws that take inspiration from the CCPA. While these laws share many similarities and provide for similar privacy rights (eg, the rights of access, correction, deletion and opting out of the sale of personal information, etc), they are not identical, and there are a number of significant differences that organisations should be mindful of. A summary of some of the key similarities and differences is listed in 1.7 Key Developments.

Territorial Scope

Organisations established in other jurisdictions may be subject to both federal and state privacy laws if they collect, store, transmit, process or share personal information of US residents.

Principles

The FTC has issued various guidance documents addressing principles such as:

  • transparency;
  • lawfulness of processing;
  • purpose limitation;
  • data minimisation;
  • proportionality;
  • retention; and
  • recommended privacy-by-design practices.

The FTC staff has also issued guidance on online behavioural advertising, emphasising core principles such as:

  • giving meaningful disclosure and choice to consumers;
  • limiting data retention; and
  • obtaining consent where information is intended to be used in a manner that differs from the disclosures made when the data was collected.

Privacy Policy

Certain states have enacted laws requiring the publication of a privacy policy. The first state law in the nation to require commercial websites and online services to post a privacy policy – the California Online Privacy Protection Act (CalOPPA) – went into effect in 2004. CalOPPA was later amended in 2013 to require certain disclosures regarding tracking of online visits.

CalOPPA applies to any person or company whose website or online service collects personal information from California consumers. It requires the website to feature a conspicuous privacy policy stating exactly what information is collected and with whom it is shared. Sectoral laws may impose certain requirements. For example, financial institutions covered by the Gramm-Leach-Bliley Act must tell their customers about their information-sharing practices and explain to customers their right to “opt out” if they do not wish their information to be shared with certain third parties.

On 21 February 2024, the California Attorney General announced a settlement with DoorDash, resolving allegations that the company violated the CCPA and CalOPPA. According to the Attorney General, the company sold its California customers’ personal information between 2018 and 2020 without providing notice or an opportunity to opt out of that sale, in violation of both the CCPA and CalOPPA. The Attorney General also alleged that the company violated CalOPPA by failing to state in its posted privacy policy that it disclosed personally identifiable information.

Individual Rights

There is no general right of access, rectification, deletion, objection or restriction recognised across the country for all types of personal information. Instead, the existence of these rights depends on each specific statute (there is no common general approach across the country). For example, COPPA provides that parents have a right to review and delete the personal information relating to their children. Pursuant to HIPAA, individuals are entitled to request copies of medical information held by a health services provider. Pursuant to the FCRA, individuals may receive a copy of their credit report maintained by a reporting agency.

In relation to state law, the CCPA grants California residents several rights in relation to personal information held by a business relating to that resident, such as the right of access, right of deletion, right to restrict processing, right to data portability, etc. The CPRA further extends the CCPA, recognising the right to correct inaccurate information. Other states have since adopted comprehensive state privacy laws, as further explained in 1.7 Key Developments.

Registration Requirements

Some states (such as California and Vermont) require data brokers to register with the state Attorney General. For example, California’s data broker law applies to “data brokers”, which are defined as businesses that knowingly collect and sell to third parties the personal information of consumers with whom the businesses do not have direct relationships. Data brokers must also pay an annual registration fee. Any data broker that fails to register may be subject to a civil penalty of USD100 for each day it remains unregistered, as well as to other penalties, fees and costs.

On 10 October 2023, Senate Bill 362, often referred to as the Delete Act, was signed into law. It requires data brokers to now register with the California Privacy Protection Agency (which will enforce the law) and to disclose the types of personal information they collect. The CPPA would also create a free, simple way for Californians to direct all data brokers to delete their personal information free of charge. Data brokers that fail to adhere to the law would face civil penalties and administrative fines set by the CPPA.

Data Protection Officer

There are no specific requirements to appoint a formal privacy officer or data protection officer in the USA. However, certain regulated entities (eg, those covered by statutes such as HIPAA or the GLBA) are required to comply with certain privacy and security obligations. Some states may also require the formal appointment of an employee to maintain the organisation’s information security programme. In any case, appointing a chief privacy officer and a chief information security officer is a best practice that is common among larger organisations and increasingly among mid-sized ones.

International Transfers

The USA does not have restrictions on the transfer of personal information to other countries.

Data Security and Data Breaches

Certain federal and state laws impose obligations to ensure the security of personal information. The FTC has stated that a company’s security measures must be reasonable. In addition, some federal and state laws establish breach notification requirements. State statutes require the reporting of data breaches to a state agency or Attorney General under certain circumstances.

In the USA, certain statutes (such as the GLBA and the FCRA) impose additional requirements for sensitive information.

Financial Information

The GLBA regulates the collection, safekeeping and use of private financial information by financial institutions. For example, according to the GLBA’s Safeguards Rule, if an entity meets the definition of a financial institution, it must adopt measures to protect the customer data in its possession. Financial institutions are required to:

  • notify customers of their data practices and privacy policies;
  • prevent the disclosure of personal information to third parties; and
  • establish appropriate safeguards to secure personal information.

Health Information

For organisations operating in the healthcare industry, the Department of Health and Human Services (HHS) enforces compliance with HIPAA and HITECH. HIPAA requires that organisations enter into business associate agreements with vendors who will require access to personal health information (PHI). Such agreements restrict the vendors’ use and disclosure of the PHI except as set out in the agreement, as well as ensure the confidentiality and integrity of data. HIPAA’s Breach Notification Rule requires any data breaches to be reported to the HHS and imposes civil and criminal penalties for organisations that fail to adequately protect PHI with appropriate information security standards. In addition, HIPAA’s Security Rule requires organisations to maintain appropriate administrative, physical and technical measures to protect the confidentiality, integrity and security of electronic PHI.

Communications Data

Communications data is governed by a number of federal laws, such as:

  • the CAN-SPAM Act, which prevents customers from receiving deceptive commercial emails and requires the implementation of opt-out mechanisms;
  • the Computer Fraud and Abuse Act, which prohibits hacking and other unauthorised access to computer systems and networks; and
  • the Telephone Consumer Protection Act, which restricts telemarketing calls and the use of auto-dialler technology.

Children’s and Students’ Information

Information relating to children is protected by the Children’s Online Privacy Protection Act (COPPA), which imposes requirements on operators of websites or online services directed to children under the age of 13, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under the age of 13. Among other requirements, operators of websites or online services must:

  • post a complete privacy policy online;
  • notify parents directly about their information-collection practices; and
  • obtain verifiable parental consent before collecting personal information from their children or sharing it with others.

On 20 December 2023, the Federal Trade Commission (FTC) published its Notice of Proposed Rulemaking to update COPPA. If ultimately approved, the new rules would require regulated companies that direct online services to children under the age of 13 (or that have actual knowledge that they are collecting personal information from a child under the age of 13) to implement significant changes to their business operations. Such proposed changes include:

  • the requirement for a separate opt-in for targeted advertising to children;
  • new parental notice and consent requirements;
  • the need to develop, implement and publish written data retention policies specific to children’s personal information; and
  • the need to develop and maintain written data security programmes.

The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable programme of the US Department of Education. It gives parents or eligible students more control over their educational records, and prohibits educational institutions from disclosing “personally identifiable information in education records” without the written consent of an eligible student, or, if the student is a minor, the student’s parents.

Video-Viewing Information

The Video Privacy Protection Act (VPPA), passed by Congress in 1988, is intended to prevent a “video tape service provider” from “knowingly” disclosing an individual’s “personally identifiable information” (PII) to third parties where that individual “requested or obtained… video materials” such as “pre-recorded video cassette tapes or similar audio-visual materials”. When passing the law, Congress had in mind rental video providers of visual materials such as VHS tapes. While the text of the VPPA may appear outdated today, the VPPA has been at the centre of a number of high-profile lawsuits in recent years, since its broad language is used in relation to digital video materials, such as online video-streaming services. The VPPA creates a private right of action and allows a court to award statutory damages upwards of USD2,500 per violation.

The VPPA has recently made a bit of a comeback as plaintiffs are now using it to challenge the use of pixel technology across a variety of websites that provide online video content. For example, a lawsuit alleging a violation of the VPPA has been allowed to proceed against a gaming and entertainment website which “hosts prerecorded video-streaming content”, although many such claims have also been dismissed where plaintiffs failed to adequately allege either a relationship with the business (such as registration or any subscription commitment) or access to restricted content.

Credit and Consumer Reports

Credit and consumer reports are governed by the FCRA, as amended by the Fair and Accurate Credit Transactions Act 2003, which promotes accuracy, fairness and privacy of the information contained in consumer credit reports and aims to protect consumers from identity theft. The law regulates the way credit-reporting agencies can collect, access, use and share the data they collect in individuals’ consumer reports. For example, the FCRA grants consumers the right to request and access all the information a reporting agency has about such a consumer. Enforcement of the FCRA is shared between the FTC and federal banking regulators.

Online Behavioural Advertising

The FTC staff has issued guidance on online behavioural advertising, emphasising the following principles to protect consumer privacy interests:

  • transparency and control – websites are expected to provide clear and prominent notice regarding behavioural advertising, as well as an easily accessible way for consumers to choose whether to have their information collected for such purpose (the report further encourages firms to design creative and effective disclosure mechanisms that are separate from their privacy policies);
  • providing reasonable security for any data they collect for behavioural advertising, and retaining data only as long as it is needed to fulfil a legitimate business or law enforcement need; and
  • express consent should be obtained before using information in a manner that is materially different from the disclosures provided when the data was collected.

The CAN-SPAM Act, a law that sets out the rules for commercial email, requires commercial messages to contain a method for recipients to opt out or unsubscribe from such communications without incurring any costs. Despite its name, the CAN-SPAM Act does not apply just to bulk email. It covers all commercial messages, which the law defines as “any electronic mail message, the primary purpose of which is the commercial advertisement or promotion of a commercial product or service”, including email that promotes content on commercial websites. The law makes no exception for business-to-business email. That means that all email – for example, a message to former customers announcing a new product line – must comply with the law. However, emails that are informational, transactional or relationship-oriented are exempt from the CAN-SPAM Act.

There are federal and state laws that apply to telemarketing communications, which vary in the restrictions imposed, including:

  • restricted calling times;
  • do-not-call registers;
  • opt-out requests;
  • mandatory disclosures; and
  • a prohibition on using auto-diallers or pre-recorded messages.

Under the TCPA, an individual’s express written consent must be obtained before certain marketing texts may be sent to a mobile phone, which includes messages sent using an auto-dialler. The TCPA and CAN-SPAM Act apply to both business-to-consumer and business-to-business electronic direct marketing. The FTC, FCC and the state Attorneys General are active enforcers in this area. California’s Shine the Light Act requires businesses that disclose personal information to third parties for the direct marketing purposes of those third parties to provide notice and access to certain information.

Federal Legislation

Broadly, in the USA, employee monitoring is legal and mostly unregulated. As an employer-provided computer system is property of the employer, they may listen to, watch and read employees’ workplace communications and, in some cases, personal messages. While the Fourth Amendment of the US Constitution protects the privacy rights of federal, state and local government employees, this protection does not extend to employees in the private sector.

Digital privacy is covered by the Electronic Communications Privacy Act (ECPA), which protects against the interception (in transit) of digital and electronic communications. It also includes the Stored Communications Act (SCA), which, as the name suggests, covers the disclosure of stored communications and records. The ECPA permits employers to monitor the verbal and written communications of their employees, provided there is a legitimate business reason for such monitoring or the employer has obtained the employee’s consent. The SCA has a broader exception, allowing employers to access stored information outside the ordinary course of business.

State Legislation

There are some state laws that regulate the monitoring of employee communications. In Connecticut, employees must receive written notice of the monitoring and the monitoring methods that will be used. In California, Florida, Louisiana and South Carolina, there is a state constitutional right to privacy, which makes employee monitoring difficult for employers. On a state level, only Connecticut and Delaware require that employers notify employees about monitoring of email or internet beforehand.

In July 2023, California Attorney General Rob Bonta announced an investigative sweep, through inquiry letters sent to large California employers requesting information on the companies’ compliance with the CCPA with respect to the personal information of employees and job applicants.

Video Surveillance

The National Labor Relations Board has stated that video surveillance introduced in the workplace is a condition of employment and, as such, should be agreed with trade unions and be subject to collective bargaining unless previously agreed. The National Labor Relations Board recommends that the roll-out of any surveillance or monitoring programmes always be subjected to the scrutiny of trade unions. There are significant issues caused in monitoring employees in relation to trade union activities.

Whistle-Blowing

US employees are protected from retaliation from their employers if they make a protected disclosure under the Whistleblower Protection Act. For federal employees, disclosures are usually made to an Inspector General using a confidential hotline that permits confidential whistle-blowing disclosures. The Inspectors General may not disclose the identity of the disclosing employee unless it is unavoidable or is mandated by a court order. For non-federal employers, it is recommended that hotlines allow for anonymous reporting. Further, the Sarbanes-Oxley Act 2002 introduced a requirement for publicly traded companies to implement a mechanism for employees to make anonymous reports of financial irregularities.

FTC Enforcement

The FTC is active in regulating data security and privacy issues. The possible enforcement penalties that are available to the FTC include injunctions and damages, although the FTC places greater reliance on consent decrees, under which the organisation will be monitored by the FTC for further violations, which will incur financial penalties.

Over the course of 2023, the FTC announced numerous cases involving consumers’ sensitive health data, alleging violations of both Section 5 of the FTC Act and the FTC’s Health Breach Notification Rule. Children’s privacy was another key area of focus for the FTC in 2023, with the FTC finalising record-setting penalties against Epic Games, creator of the popular video game Fortnite. The company was required to pay USD275 million for violations of COPPA, following allegations that Epic had collected children’s personal information without parental consent and set voice and text chat features to “on” by default, as well as USD245 million over allegations that the company used dark patterns and other deceptive practices to trick players into making unwanted purchases. In 2023, the FTC also announced:

  • a USD20 million settlement against Microsoft on the basis that the company allegedly collected personal information from children who signed up to its Xbox gaming system without notifying their parents or obtaining their parents’ consent, and by illegally retaining children’s personal information; and
  • a USD25 million settlement against Amazon for its Alexa voice assistant service on the basis that the company allegedly prevented parents from exercising their deletion rights under the COPPA Rule, misled parents about their ability to delete their child’s voice recordings by retaining written transcripts, kept sensitive voice and geolocation data for years, and used it for its own purposes, while putting data at risk of harm from unnecessary access.

In addition to children protection, the FTC took action against home security camera company Ring and required the company to pay USD5.8 million for allegedly compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos, and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras and videos.

Private Litigation

In addition to enforcement from regulatory entities, individuals may bring private rights of action and class actions for privacy and security violations that relate to credit reporting, marketing, electronic communications and call recording, under the respective legislation. Pursuant to the CCPA (California), individuals may bring a private right of action to claim statutory damages where their unencrypted personal information was not adequately protected by an organisation. It is possible that there will be increased class actions in this area.

Employees may also bring a private right of action under the common law, where previous cases have established a precedent regarding the invasion of their privacy by their employer’s workplace monitoring. Employees would need to demonstrate that there was an expectation of privacy in relation to the specific information that has been monitored by an employer.

Over the course of 2023, there was a wave of privacy class actions, alleging that the use of website session replay, chatbot, pixel and similar technologies constitute “wiretapping” and therefore violate state wiretap statutes such as the California Invasion of Privacy Act (CIPA). Wiretap statutes prohibit wiretapping, eavesdropping and non-consensual telephone call recordings. Violations of CIPA are particularly attractive for plaintiffs because a successful suit can result in a USD5,000 statutory penalty per violation. Companies should therefore update their privacy policies, terms of use and relevant disclosures to consumers, both on their websites and in their chatbot features, to ensure transparency, and should obtain proper consent prior to the use of chat transcripts and related content.

The Fourth Amendment of the US Constitution protects the privacy of a person and possessions from unreasonable searches and seizures by federal or state law enforcement authorities. This right is triggered where an individual has a reasonable expectation of privacy.

The Fourth Amendment provides safeguards to individuals during searches and detentions, and prevents unlawfully seized items from being used as evidence in criminal cases. The degree of protection available in a particular case depends on:

  • the nature of the detention or arrest;
  • the characteristics of the place searched; and
  • the circumstances under which the search takes place.

The reasonableness standard generally requires a warrant supported by probable cause. The search and seizure must also be conducted reasonably. When law enforcement officers violate an individual’s constitutional rights under the Fourth Amendment, and a search or seizure is deemed unlawful, any evidence derived from that search or seizure will almost certainly be kept out of any criminal case against the person whose rights were violated.

The Foreign Intelligence Surveillance Act

The Foreign Intelligence Surveillance Act (FISA) permits the US government to access personal data for national security purposes. Pursuant to FISA, the government can obtain information, facilities or technical assistance from a broad range of entities. National Security Letters (NSLs) offer an additional investigative tool for limited types of entities. The Foreign Intelligence Surveillance Court (FISC), a federal court staffed by independent, life-tenured judges, approves and oversees FISA activities.

Executive Order 12333

Originally issued in 1981, Executive Order 12333 on US Intelligence Activities (EO 12333) was enacted to, among other things, “enhance human and technical collection techniques [of the US government], especially those undertaken abroad, and the acquisition of significant foreign intelligence, as well as the detection and countering of international terrorist activities and espionage conducted by foreign powers”.

In broad terms, EO 12333 provides the foundational authority by which US intelligence agencies collect foreign “signals intelligence” information, being information collected from communications and other data passed or accessible by radio, wire and other electromagnetic means. Unlike FISA’s Section 702, EO 12333 does not authorise the US government to require any company or person to disclose data.

Similar to FISA’s Section 702, EO 12333 requires procedures to minimise how an agency collects, retains or disseminates US person information. These procedures must be approved by the Attorney General and can be found in documents such as United States Signals Intelligence Directive SP0018 (USSID 18).

Presidential Policy Directive 28

Presidential Policy Directive 28 (PPD-28), a Presidential Directive in effect since 2014, sets certain binding requirements for SIGINT (ie, signals intelligence) activities.

Executive Order 14086

On 7 October 2022, President Biden signed an Executive Order to implement the EU-US Data Privacy Framework. Among other things, the new framework will allow individuals in the EU to seek redress through an independent Data Protection Review Court made up of members outside the US government. That body “would have full authority to adjudicate claims and direct remedial measures as needed”. In addition, the Executive Order provides that US signals intelligence activities may only be conducted following a determination that they are “necessary to advance a validated intelligence priority”, and “only to the extent and in a manner that is proportionate to the validated intelligence priority for which they have been authorised”. The Executive Order also specifies certain “legitimate objectives” and “prohibited objectives” for which US signals intelligence activities may be carried out. The Executive Order also requires US intelligence agencies to review their policies and procedures to implement these new safeguards.

The CLOUD Act

The US Clarifying Lawful Overseas Use of Data Act (the “CLOUD Act”) was passed in 2018, mooting the then pending US Supreme Court case, United States v Microsoft (Ireland), in which Microsoft challenged a warrant from the US government requiring it to produce emails that were electronically stored on servers located in Ireland. The CLOUD Act amended an existing US law, the Stored Communications Act (SCA), to allow US law enforcement, through a warrant, subpoena or court order, to access communications data stored electronically outside the USA, as long as the information sought is relevant and material to an ongoing criminal investigation.

The CLOUD Act explicitly states that it applies to providers of an electronic communications service or remote computing service who hold or store data or other information “pertaining to a customer or subscriber”, “regardless of whether such communication, record or other information is located within or outside the United States”. Accordingly, even if data is stored outside the USA, the US government would still be able to seek access to such data located outside the USA, as long as the service provider is subject to the jurisdiction of the USA. These powers apply to any provider of an electronic communications service or remote computing service who is subject to US jurisdiction.

CLOUD Act Agreements

In addition, the CLOUD Act also enables entry into executive agreements with foreign countries, whereby countries who enter into such agreements may request data directly from companies based in the other country. In this respect, the CLOUD Act supplements rather than eliminates mutual legal assistance treaties (MLATs), which remain another method by which evidence in criminal cases is made available to authorities from other countries.

“Quashing” CLOUD Act Warrants

In addition, the CLOUD Act provides for a procedure for service providers to file a motion to “quash” (ie, annul) or modify a CLOUD Act warrant, in limited circumstances and subject to several conditions. The CLOUD Act provides that “a provider of electronic communication service to the public or remote computing service, including a foreign electronic communication service or remote computing service, that is being required to disclose” the contents of a communication, may file a motion to modify or quash the legal process where the provider reasonably believes:

  • that the customer or subscriber is not a United States person and does not reside in the United States; and
  • that the required disclosure would create a material risk that the provider would violate the laws of a qualifying foreign government.

According to the US Department of Justice:

“[a] request to issue a warrant must be submitted to an independent judge for approval. The judge cannot authorise the warrant unless he or she finds that the government has established by a sworn affidavit that ‘probable cause’ exists that a specific crime has occurred or is occurring and that the place to be searched, such as an email account, contains evidence of that specific crime. Further, the warrant must describe with particularity the data to be searched and seized; fishing expeditions to see if evidence exists are not permitted.”

As mentioned in 1.4 Multilateral and Subnational Issues and 1.7 Key Developments, there have been quite a few developments in the area of international data transfers. The invalidation by the CJEU on 16 July 2020 of the Privacy Shield framework has led to quite a few changes, including a new set of Standard Contractual Clauses issued by the European Commission and, more recently, the Executive Order to implement the EU-US Data Privacy Framework. As mentioned previously, the Executive Order is not specific to the EU-US Data Privacy Framework: the European Commission has stated that “all the safeguards that have been put in place by the US government in the area of national security (including the redress mechanism) will be available for all transfers to companies in the USA under the GDPR, regardless of the transfer mechanisms used”.

There are no restrictions on international data transfers of personal information under US law. However, data transfer restrictions introduced by other jurisdictions, such as those pursuant to EU law, restrict the transfer of personal data relating to EU residents into countries such as the USA that are not deemed to offer an “adequate” level of protection. In order to remedy this situation, companies have to commit to EU principles by entering into arrangements such as binding corporate rules and standard contractual clauses (SCCs) to facilitate the data transfer, and must implement supplementary safeguards.

On 4 June 2021, the European Commission issued modernised standard contractual clauses under the GDPR for data transfers from controllers or processors in the EU/EEA (or otherwise subject to the GDPR) to controllers or processors established outside the EU/EEA (and not subject to the GDPR). These modernised SCCs replace the three sets of SCCs that were adopted under the previous Data Protection Directive 95/46.

On 7 October 2022, President Biden signed an Executive Order to implement the EU-US Data Privacy Framework. The Executive Order is not limited to the EU-US Data Privacy Framework, however: as stated by the European Commission, “all the safeguards that have been put in place by the US government in the area of national security (including the redress mechanism) will be available for all transfers to companies in the USA under the GDPR, regardless of the transfer mechanisms used”.

As mentioned in 1.4 Multilateral and Subnational Issues, 1.7 Key Developments and 3.4 Key Privacy Issues, Conflicts and Public Debates, the EU-US Data Privacy Framework is now in place.

See under Global CBPR Forum in 1.4 Multilateral and Subnational Issues.

US law does not require any government notifications or approvals in order to transfer personal information internationally.

There are no data localisation requirements under US federal law. However, the transfer of sensitive personal information belonging to US citizens is an emerging issue in the USA.

Certain public procurement contracts impose domestic data storage as a requirement.

There is no law formally requiring software code, algorithms or similar technical detail to be shared with the US government. This does not mean, however, that organisations have never been requested to share such information, for example on the grounds of national security. Such requirements may, for instance, exist in certain public procurement contracts.

A mutual legal assistance treaty (MLAT) is the most common method of foreign enforcement agencies requesting assistance with cross-border issues and access to information located within another jurisdiction. However, organisations are not compelled to comply with such requests. The MLAT simply provides a formal mechanism for processing information requests.

Under the CLOUD Act, service providers under US jurisdiction may be prevented from disclosing communications to foreign governments unless there is a CLOUD Act agreement in place. However, these executive agreements only lift the blocking statute (the Stored Communications Act) and permit companies to comply with foreign government requests; companies are not required to comply with such requests.

The Stored Communications Act (SCA) operates as a “blocking statute” as it prohibits service providers in the USA from disclosing communications to a foreign government (subject to limited exceptions that do not apply to foreign government requests) unless there is a CLOUD Act agreement in place. The SCA will apply where the information sought by the foreign government relates to the communications of one of its own nationals, even where it relates to the investigation of criminal behaviour. Furthermore, the SCA prevents disclosure of such data even where the foreign government is subject to an order under its own national laws to obtain the required information.

Artificial Intelligence

There are no specific federal laws in the USA regarding artificial intelligence (AI).

On 26 January 2023, the US National Institute of Standards and Technology (NIST) released the Artificial Intelligence (AI) Risk Management Framework (AI Risk Management Framework 1.0), a voluntary guidance document for managing and mitigating the risks of designing, developing, deploying and using AI products and services. NIST also released a companion playbook for navigating the framework, a roadmap for future work, and mapping of the framework for other standards and principles, both at home and abroad.

At the state level, a number of state legislatures have introduced laws to combat discriminatory AI practices. For example, Colorado requires insurers to disclose and conduct risk management of any use of algorithms and predictive modelling in order to better guarantee equitable insurance coverage. New York City passed a law in 2021 that restricts the use of automated decision systems in the screening of candidates by requiring employers to conduct bias audits, publish results and notify candidates of the use of such tools, subject to civil penalty. States such as California have also issued regulations in relation to automated decision-making practices.

Connected TVs

California was the first state in the USA to regulate the collection and use of voice data through connected televisions (ie, smart TVs). Section 22948.20 of the Business and Professions Code provides that a “person or entity shall not provide the operation of a voice recognition feature within this state without prominently informing, during the initial set-up or installation of a connected television, either the user or the person designated by the user to perform the initial set-up or installation of the connected television”. In short, this section requires manufacturers to provide notice of voice-control features during the initial set-up of a connected television. Sections 22948.20 (b) and (c) also restrict the sale or use of voice data for advertising purposes.

Internet of Things (IoT)

California is also the first state in the nation to enact a cybersecurity law for connected devices, as in October 2019 Senate Bill 327 was signed into law. This law, also known as the Internet of Things (IoT) Law, requires device manufacturers to consider and to implement security features for all functionality stages of connected devices. Notably, the IoT Law does not appear to be limited to consumer devices: any device that connects to the internet, regardless of the type of information processed, appears to be covered by this law. Other states such as Oregon have also adopted a similar law.

In December 2020, a federal law, the IoT Cybersecurity Improvement Act of 2020, was signed into law, requiring NIST to develop and publish standards and guidelines on addressing issues related to the development, management, configuring and patching of IoT devices for use by federal agencies.

Biometrics and Facial Recognition

In the USA, there is no single federal law that regulates biometric data use and collection, although there are state-specific laws in place. For example, the State of Illinois introduced the Biometric Information Privacy Act (BIPA) in 2008, which regulates how private entities can collect, use and share biometric information and biometric identifiers, and which imposes certain security requirements to protect this data. In particular, the Illinois Supreme Court held in Rosenbach v Six Flags Entertainment Corp (2019) that the BIPA does not require persons whose fingerprints or other biometric identifiers are stored without compliance with the law to prove anything more before being able to sue for the statutory damages prescribed by the statute.

Chatbots

On 1 July 2019, California’s Bolstering Online Transparency Act (the “BOT Act”) came into effect as a reaction to growing concerns that, as technology improves, bots are getting increasingly better at influencing consumers and voters. The BOT Act defines a bot as an “automated online account where all or substantially all of the actions or posts of that account are not the result of a person”. The BOT Act makes it “unlawful for any person to use a bot to communicate or interact with another person in California online, with the intent to mislead the other person about its artificial identity… in order to incentivise a purchase or sale of goods or services in a commercial transaction or to influence a vote in an election”. There is no liability, however, if the person discloses its use of a bot in a manner that is “clear, conspicuous and reasonably designed to inform persons with whom the bot communicates or interacts”.

The BOT Act only applies to bots that interact with California residents, but there is currently no indication that the law is limited to California businesses only.

Organisations in the USA have not yet established any protocols for digital governance or fair data practice review boards or committees to address the risks of emerging or disruptive digital technologies. However, organisations can establish such protocols or bodies on a voluntary basis.

See 1.8 Significant Pending Changes, Hot Topics and Issues.

The acquirer’s due diligence investigation should at least consider the following (note: this list is not intended to be exhaustive).

  • To what extent does the target company gather and use personal information?
  • What kind of privacy policy is provided and is it in line with the requirements of the applicable state laws (eg, the CCPA)? Has the target company made any commitments and representations to its users and customers in connection with privacy and security issues?
  • Does the target company have in place a process in relation to customer requests? What is the volume of requests?
  • What are the particular types of privacy and cybersecurity risks of the target company given its industry sector, geographic reach, and the nature of its products or services?
  • Does the acquirer have a clear understanding of the target company’s network, system architecture and data flows, including the use of cloud providers and third-party applications? What is the data retention and deletion policy? Does the company transfer data on a cross-border basis?
  • Will the acquiring company need to obtain any consent, or will it be subject to notification obligations to use any type of information from the selling company post-closing?
  • What are the security practices of the target company? Does the target company have a written security programme that meets current industry standards and best practices?
  • Has the target company experienced any prior cybersecurity incidents, including data breaches, and how has it responded to such incidents? Has there been any complaint or regulatory investigation?

If any pre-closing sharing of data takes place, a data transfer agreement will need to be put in place. Typically, this will cover the acquiring company’s obligations around the handling of such data – eg, requiring the acquiring company to:

  • comply with all applicable data privacy laws;
  • put in place appropriate security measures;
  • notify of security breaches;
  • only use the data for certain specified purposes related to the acquisition (eg, to evaluate the target as an acquisition target, to carry out any necessary pre-closing testing or pre-closing integration preparation); and
  • destroy the data if the acquisition deal does not close within a certain time.

In July 2023, the Securities and Exchange Commission (SEC) adopted rules requiring registrants to disclose material cybersecurity incidents they experience, and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy and governance. The SEC also requires foreign private issuers to make comparable disclosures.

On 9 July 2021, President Joe Biden signed an Executive Order to promote competition in the American economy. The executive order announces a shift towards a greater scrutiny of mergers, “especially by dominant internet platforms, with particular attention to the acquisition of nascent competitors, serial mergers, the accumulation of data, competition by ‘free’ products, and the effect on user privacy”. It also encourages the US Federal Trade Commission to establish rules on surveillance, data accumulation and “barring unfair methods of competition on internet marketplaces”.

There are no other significant issues in US data protection practice not already addressed in this article.

Fieldfisher

2650 Birch Street
Suite 100
Palo Alto, CA 94306
USA

+1 650 313 2361

Paul.Lanois@fieldfisher.com www.fieldfisher.com
Author Business Card

Law and Practice in USA

Author



Fieldfisher is a European law firm with market-leading practices in many of the world’s most dynamic sectors. The firm is a forward-thinking organisation with a particular focus on technology, financial services, energy and natural resources, and life sciences. Fieldfisher chooses a collaborative approach with an intense focus on the end-user, and carefully considers how to shape its services to add the most value to its clients. Many of Fieldfisher’s lawyers are widely respected thought leaders, digging deep into the issues that matter most to their clients and providing answers and opinions, not just legalese. The firm’s growing European network of offices supports an international client base alongside strategic bases in Silicon Valley and China.