How to understand privacy laws that apply to Illinois Businesses

Published on:

What are some of the steps a business needs to take to comply with PIPA?

To comply with PIPA in Illinois, a business must take a number of steps. First, the business must obtain consent from individuals before collecting their personal information. This means that the business must provide individuals with clear and concise information about why their personal information is being collected, and must obtain their consent before collecting it.

Next, the business must store personal information securely and must only use it for the purposes for which it was collected. This means that the business must take steps to protect personal information from unauthorized access, use, or disclosure, and must only use personal information for the specific purposes that were disclosed to the individual at the time of collection.

In addition, the business must respond to requests from individuals to access or correct their personal information. This means that the business must provide individuals with access to their personal information upon request, and must correct any inaccurate or incomplete information at the individual’s request.

Finally, the business must comply with any other requirements of PIPA, such as providing individuals with notice of any changes to the business’s privacy policy, and must avoid engaging in any practices that are prohibited by the law. Overall, complying with PIPA involves a number of steps, and a business may need to take additional steps depending on the specific nature of its operations and the personal information that it collects.

What are some of the steps a business needs to take to comply with BIPA?

To comply with BIPA in Illinois, a business must take a number of steps. First, the business must obtain consent from individuals before collecting their biometric data. This means that the business must provide individuals with clear and concise information about why their biometric data is being collected, and must obtain their consent before collecting it.

Next, the business must store biometric data securely and must only use it for the purposes for which it was collected. This means that the business must take steps to protect biometric data from unauthorized access, use, or disclosure, and must only use biometric data for the specific purposes that were disclosed to the individual at the time of collection.

In addition, the business must develop a retention schedule and guidelines for permanently destroying biometric data. This means that the business must establish a specific time frame for retaining biometric data, and must develop guidelines for securely destroying biometric data when it is no longer needed.

Finally, the business must comply with any other requirements of BIPA, such as providing individuals with notice of the business’s biometric data practices, and must avoid engaging in any practices that are prohibited by the law. Overall, complying with BIPA involves a number of steps, and a business may need to take additional steps depending on the specific nature of its operations and the biometric data that it collects.

What are the steps a business needs to take to comply with the Gramm-Leach-Bliley Act?

To comply with the Gramm-Leach-Bliley Act (GLBA), a business must take a number of steps. First, the business must develop a comprehensive written information security plan that outlines the measures the business will take to protect the personal information of its customers. This plan should include measures to protect against unauthorized access to or use of personal information, and should be reviewed and updated periodically to ensure that it remains effective.

Next, the business must provide customers with notice of its information-sharing practices. This means that the business must provide customers with clear and concise information about how it collects, uses, and shares their personal information, and must give them the opportunity to opt out of any information-sharing practices that they do not want to participate in.

In addition, the business must implement reasonable safeguards to protect the security, confidentiality, and integrity of personal information. This might include measures such as encryption, firewalls, and regular security audits, and should be appropriate for the type and sensitivity of the personal information that the business collects.

Finally, the business must train its employees on the importance of protecting personal information, and must establish procedures for responding to security incidents. This might include establishing a process for employees to report potential security incidents, and having a plan in place for responding to and mitigating any incidents that do occur. Overall, complying with the GLBA involves a number of steps, and a business may need to take additional steps depending on the specific nature of its operations and the personal information that it collects.

What are the important cases to know when dealing with privacy & information security in the United States?

There have been many seminal court cases dealing with privacy and information security in the United States. Some examples of these cases include:

  • Griswold v. Connecticut (1965): This case involved a challenge to a Connecticut law that made it a crime to use contraception. The Supreme Court ruled that the law violated the constitutional right to privacy, establishing the right to privacy as a fundamental right protected by the Constitution.
  • Katz v. United States (1967): This case involved the use of a wiretap by the FBI to record a conversation between the defendant and another person in a public phone booth. The Supreme Court ruled that the wiretap violated the defendant’s constitutional right to privacy, and established the “reasonable expectation of privacy” test, which is still used today to determine when an individual’s privacy has been violated.
  • Roe v. Wade (1973): This case involved a challenge to a Texas law that made it illegal to obtain an abortion except to save the life of the mother. The Supreme Court ruled that the law violated the constitutional right to privacy, establishing a woman’s right to choose to have an abortion.
  • Smith v. Maryland (1979): This case involved the use of a “pen register” by the police to record the phone numbers dialed by the defendant. The Supreme Court ruled that the use of the pen register did not violate the defendant’s constitutional right to privacy, because the numbers dialed were not considered to be private information.
  • United States v. Jones (2012): This case involved the use of a GPS tracking device by the government to track the defendant’s movements. The Supreme Court ruled that the use of the GPS device violated the defendant’s constitutional right to privacy, because it constituted a search under the Fourth Amendment.

These cases have all had a significant impact on privacy and information security law in the United States, and continue to be cited and relied upon in legal disputes involving these issues.

What are the important cases to know in Illinois law dealing with privacy & information security law?

There have been many important cases dealing with privacy and information security laws in the State of Illinois. Some examples of these cases include:

  • Rosenbach v. Six Flags Entertainment Corp. (2018): This case involved a challenge to Six Flags’ practice of collecting and storing biometric information from its customers, such as fingerprints and facial recognition data, without their consent. The court ruled that Six Flags’ practices violated the Illinois Biometric Information Privacy Act (BIPA), and awarded the plaintiffs $1,000 in damages for each violation of the law.
  • Rosenbach v. Weibo Corp. (2018): This case involved a challenge to Weibo’s practice of collecting and storing personal information from its users without their consent. The court ruled that Weibo’s practices violated the Illinois Consumer Fraud and Deceptive Business Practices Act, and awarded the plaintiffs $1,000 in damages for each violation of the law.
  • In re Facebook Biometric Information Privacy Litigation (2018): This case involved a challenge to Facebook’s practice of collecting and storing biometric information from its users without their consent. The court ruled that Facebook’s practices violated BIPA, and awarded the plaintiffs $1,000 in damages for each violation of the law.
  • N.S. v. Surburban Express, Inc. (2018): This case involved a challenge to Surburban Express’ practice of collecting and storing personal information from its customers without their consent. The court ruled that Surburban Express’ practices violated BIPA and the Illinois Personal Information Protection Act (PIPA), and awarded the plaintiffs $1,000 in damages for each violation of the law.

These cases have all had a significant impact on privacy and information security law in Illinois, and are important to be aware of when dealing with these issues in the state.

What does Illinois privacy law consider as “reasonable safeguards” when it comes to protecting customer data?

Under Illinois law, “reasonable safeguards” for customer information are measures that a business takes to protect the security, confidentiality, and integrity of personal information. These safeguards should be appropriate for the type and sensitivity of the personal information that the business collects, and should be designed to protect against unauthorized access to or use of personal information.

Examples of reasonable safeguards for customer information under Illinois law might include:

  • Encrypting personal information to protect against unauthorized access
  • Using firewalls and other security technologies to prevent unauthorized access to personal information
  • Restricting access to personal information to authorized employees only
  • Regularly monitoring and auditing the security of personal information to identify and address potential vulnerabilities
  • Providing training to employees on the importance of protecting personal information
  • Having a plan in place for responding to security incidents, including procedures for reporting potential incidents and mitigating any harm that may result from them.

Overall, the specific safeguards that a business is required to implement under Illinois law will depend on the specific nature of its operations and the personal information that it collects. It is important for businesses to consult with legal counsel and to develop safeguards that are appropriate for their specific circumstances.

Related Insights:

Contact Us

Please submit your contact information to be contacted by our office. 


    Online Consultation

    The attorneys at Burhanuddin Law are available for face-to-face or virtual consultations. 

    Chicago Office
    77 W. Wacker Drive
    Suite 4500
    Chicago, IL 60601
    Contact

    O: (312) 216-5174
    F: (312) 276-8347
    E: Help@burhanuddinlaw.com

    Privacy  |  Copyright 2022 Burhanuddin Law LLC