Articles Posted in Regulatory and Compliance

Posted

On 16 August 2012, the ICO published guidance on deleting personal data under the Data Protection Act 1998 (DPA). The guidance describes how organisations can ensure compliance with the DPA when they delete or archive personal data, and explains what the ICO means by deletion and archiving and introduces the concept of putting personal data ‘beyond use.’ The guidance aims to counteract the problem of organisations informing people that their personal data has been deleted when, in fact, it is merely archived and could be re-instated; archived information is “subject to the same data protection rules as ‘live’ information, although information that is in effect inert is far less likely to have any unfair or detrimental effect on an individual than live information.”

Given the fifth data protection principle which provides that “personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes,” the deletion of personal data is an important activity for organisations which control or process personal data. The ICO notes that, although the DPA does not define “delete” or “deletion”, a plain English interpretation implies “destruction” which, in the case of electronic storage, is less certain than, say, incineration of paper records, since information which has been “deleted” may still exist within an organisation’s systems in some form or other.

The ICO says that it will “adopt a realistic approach in terms of recognising that deleting information from a system is not always a straightforward matter and that it is possible to put information ‘beyond use’, and for data protection compliance issues to be ‘suspended’ provided certain safeguards are in place.” The ICO gives specific examples of where putting information ‘beyond use’ would be an acceptable alternative to ‘deletion’. For example, an acceptable alternative may arise where for technical reasons, it is not possible to delete this information without also deleting other information held in the same batch, or where information has been deleted with no intention on the part of the data controller to use or access this again, but which may still exist in the electronic ether where it is waiting to be over-written with other data. The ICO will be satisfied that information has been ‘put beyond use’ if the “data controller holding it:

Posted

Under the previous 1981 Transfer of Undertakings (Protection of Employment) Regulations 1981 (TUPE) and the EU Acquired Rights Directive (ARD) it was not clear whether the definition of a relevant transfer caught “outsourcing” activities where there was a change of service providers or a contracting in or out of services. The UK and European courts used a number of factors to decide whether there was a “transfer of an undertaking” within the meaning of TUPE 1981, which led to a number of conflicting case law decisions on this point.

TUPE 2006 Regulations sought to address the difficulties in applying TUPE 1981 to outsourcing activities by extending the definition of a relevant transfer to include situations where:

  • there was a “service provision change” for outsourced or in-sourced activities, or

Posted

The U.S. Department of Defense, General Services Administration and the National Aeronautics and Space Administration (NASA) have issued a proposal to amend the Federal Acquisition Regulation (FAR) implementing Executive Order 13495 , which will require government contractors that take over service work from other companies to offer jobs to certain categories of the predecessor’s employees.

The presidential order is intended to aid procurement efficiency and mitigate transition risk by preserving the service continuity of the predecessor’s employees, if the contract is awarded for the same or similar work in the same location. There are many similarities with the long standing protections offered to citizens of the European Union, whose jobs are protected in certain circumstances by the Acquired Rights Directive (ARD). Under the ARD, an employee’s job is safeguarded by requiring a successor contractor to hire the employee from its predecessor on substantially the same terms and conditions (e.g., salary, benefits, years of services) as the employee enjoyed with its predecessor. Notably, the ARD applies to private sector outsourcing transactions, not just to government contracts as is the case under the proposed FAR regulations.

For any company that has sought to outsource its IT or BPO functions on a global basis, the implications of the ARD are impossible to ignore. It requires suppliers to conduct substantial due diligence on the customer’s HR policies and personnel before signing an outsourcing deal, and to make offers to its predecessor’s employees as opposed to using its own employees to perform the services. As a result, the supplier must factor the cost of hiring the new personnel into its solution, and in turn, pass that cost back as a charge to the customer. Although the consequences vary from country to country, ARD non-compliance violations can result in hefty fines for both customers and suppliers as well as potential criminal liability for certain breaches of consultation requirements in countries such as France.

Posted

Back in 1999 Kevin Ashton, the British technology pioneer and cofounder of Auto-ID Center at MIT (creators of the global standard system for radio-frequency identification (RFID)), coined the term, the Internet of Things, to describe “uniquely identifiable objects (things) and their virtual representations in an internet-like structure.” Put simply, the Internet of Things refers to networks of everyday objects such as phones, car and household appliances which are wirelessly connected to the internet through smart chips, and can collect and share data.

Now, well over a decade later, the European Commission has issued an online questionnaire which seeks views on the future regulation of the Internet of Things. The Commission sees both opportunity and threat from the exponential growth of interconnected networks, with 50 billion wirelessly connected devices predicted by 2020: “The Internet of Things holds the promise of significant progress in addressing global and societal challenges and to improve daily life. It is also a highly promising economic sector for sustainability, growth, innovation and employment. But it is likely to have a profound impact on society, in areas like privacy, security, ethics, and liability.”

Predicting a future where everyday objects are linked, the Commission has started to gather views on how best to design and shape a regulatory framework which operates in an open manner, enabling a level playing field, whilst ensuring an adequate level of control over the connected devices gathering, processing and storing information. Views on privacy, safety and security, security of infrastructure, ethics, interoperability, governance and standards are sought. Responses to the questionnaire are requested by 12 July 2012. The Commission’s recommendation on the Internet of Things is expected to be published by summer 2013.

Posted

The last outstanding requirement of the 2010 Massachusetts Data Protection Law relates to third-party service provider compliance and will take effect on March 1, 2012.

Section 17.03(2)(f)(2) of the Law mandates that entities holding Massachusetts’ residents’ personal information require their third-party service providers to contractually commit to implementing and maintaining security measures for personal information. The Law defines a service provider as

“any person that receives, stores, maintains, processes, or otherwise is permitted access to personal information through its provision of services directly to a person that is subject to [the Massachusetts] regulation.”

Posted

In the waning days of 2011, a measure was introduced in Congress directed at U.S. companies utilizing overseas call centers that may not have attracted much attention. However, given the current economic environment, industry press and at least one foreign government have taken note of the bill.

On December 7, 2011, a bipartisan group of Representatives introduced the United States Call Center Worker and Consumer Protection Act (H.R. 3596) (the “Bill”). The Bill specifically targets U.S. companies relocating call center operations overseas by (1) requiring them to disclose such action to the Secretary of Labor nearly six months prior to the relocation, and (2) making such companies ineligible for Federal grants or loans for a period of five years. Additionally, the Bill mandates that overseas agents fielding customer inquiries for U.S. businesses (regardless of whether the call center arrangement is new or already in existence) to disclose their physical location at the beginning of a communication.

While the Bill appears to be aimed at large customer call centers that field consumer complaints or inquiries, the Bill’s language could apply to instances where internal service help desks (i.e., non-customer facing) are moved overseas. It is not clear from the Bill’s language if these operations are intended to fall within the scope of the Bill but the language as currently drafted does not entirely foreclose the possibility.

Posted

We have previously discussed on this blog the increasing difficulty that offshore service providers are facing in obtaining U.S. visas for its employees that are non-U.S. citizens (see “The Buzz about Visas for Offshore Service Provider Personnel and the Link to On-Shore Hiring“). The rejection rate for H-1B visa applications has skyrocketed over the past two years, which has added to the administrative headaches that offshore service providers face when trying to bring their top talent to their U.S. client sites.

In the midst of this, Infosys has been battling allegations from internal whistleblowers that it has been abusing the visa application process in order to circumvent the administrative hurdles. Whistleblowers claim that Infosys has been applying for B-1 visas for its employees, which contemplate very short term visits (e.g., a visit for a conference) as opposed to the more difficult to obtain H-1B visa, which are required for long term projects and are subject to an annual cap on the number that the U.S. issues. In addition, the B-1 visa doesn’t include the prevailing wage and federal tax requirements that an H-1B visa requires. Infosys has denied abusing the visa system for its own benefits. However, Infosys was dealt a judicial blow recently when one of its employees, who alleged in a lawsuit that Infosys wrongly obtained B-1 visas in its work, won a federal court decision that set aside an arbitration clause and will allow him to bring his case to a jury. The employee, Jack “Jay” Palmer alleges that he was pressured by Infosys to systematically apply for B-1 visas when H-1B visas were required. The federal court held that the arbitration clause Palmer signed as part of his employee agreement is not binding, and Palmer may bring the case in front of a jury.

In response to the decision, computerworld.com stated that Infosys released a statement, which said that while the decision “is not the one we had hoped for, it is one that we have planned for. We take very seriously our obligations under the law and specifically our responsibilities to comply with the immigration laws and visa requirements in all the jurisdictions where we have clients. The fact is that there is not, nor was there ever, a policy to use the B-1 visa program to circumvent the H-1B program.” In addition to the civil suit, Palmer’s allegations have ignited the interest of the U.S. Department of Justice, which has begun a grand jury investigation into Infosys’s tax and immigration practices.

Posted

With the same lack of fanfare that accompanied the April 13 release of the Reasonable Security Practices and Procedures and Sensitive Personal Information rules , today the Indian government released a clarification to those rules to address the most serious concerns arising from ambiguities in the original provisions.

As we noted in our previous post on the new rules, Pillsbury does not provide legal advice on Indian law, but we have been in contact with the Indian legal community and service providers with regard to the new rules.

The Press Note provided on the Indian government’s web site states:

Posted

The press has recently given much attention to the growing difficulty of securing U.S. visas for offshore provider personnel and the impact on U.S. clients. In fact research firm CLSA Asia-Pacific released a report this past week downgrading its outlook for the Indian IT Services Sector citing “the visa issue [as] fundamentally altering the business model for Indian techs.” At the same time, an uptick in onshore hiring by many of the big name Indian providers, including Tata Consultancy Services, Aegis Communications, Genpact, Wipro, and Infosys , is making headlines. The Wall Street Journal India Real Time Blog included an entry in the past week summarizing some of the recent press on these issues .

Why is the current visa process for offshore service providers more troublesome than in the past? According to recent statistics, the rejection rate for applicable U.S. visas has increased from a reported rate of 5% to 40% over the past 18 months. The visa challenge is not limited to the United States: the United Kingdom, Switzerland and Canada also appear to be introducing more stringent caps. Conjecture that the 2012 U.S. election cycle will add greater uncertainty to the U.S. visa process for offshore providers seems to be adding to the unease. Finally, any discussion of the state of U.S. visas for offshore providers would not be complete without mentioning the accusations of visa fraud currently being leveled against Infosys . These accusations cast a further shadow on the current state of visas. All of this news seems to indicate what many clients and sourcing professionals have started to see first hand, the temporary and long term visa process in the United States is impacting offshore providers’ ability to staff their projects.

Despite the CLSA report and glum news about the state of visas for its work force, at least one overseas sourcing provider has refuted the recent publicity. Tata Consultancy has downplayed the impact of overseas visa policies noting the situation is “an irritant” and simply indicates that “staffing of engagements has to be planned better, well in advance…” . Nonetheless, in the wake of the visa issue, many of the Indian sourcing giants seem to be increasing their onshore hiring to bypass visa uncertainty. For example, Tata Consultancy released a statement in mid June noting that it will hire more than 1,200 onshore personnel this fiscal year. Similarly, Infosys has plans to hire 1,500 U.S. citizens and Aegis recently announced plans to hire approximately 10,000 U.S. citizens over the next three years. These announcements are evidence of an increasing trend toward staffing more work locally with U.S. citizens.

Posted

For most enterprise customers, telecommunications regulation is a fact of life, requiring buyers to do what they can during negotiations to mitigate changes in state and federal law that could result in substantial cost increases during the term of the contract. Now, the Federal Communications Commission (FCC) is considering sweeping changes to mostly obscure rules concerning inter-carrier compensation and universal service that could have a large dollar impact on your future telecommunications purchases. These proposed changes come at a time when – and directly as a result of – enterprise customers are converging voice and data over Internet Protocol (IP)-based broadband networks and making greater use of wireless services.

Inter-carrier compensation is basically what carriers charge each other to originate or terminate traffic on another provider’s network. Telecommunications — including voice traffic that transits the public Internet or managed IP networks — is unique in that multiple service providers are usually required to complete a voice call. Rarely do calls (except possibly those in a corporate campus environment) originate and terminate on the same provider’s network. Compensation arrangements vary by geography and technology — with local traffic having one rate, intrastate calls a second rate and interstate calls a third rate. There is a separate compensation structure for wireless traffic, and IP-originated traffic (coming from broadband networks) has created another level of confusion (and a number of lawsuits). Per minute charges range from $0 to $.03 cents. The impact to large customers, is, ultimately, these costs are included within the rates charged to end users.

The FCC would like to rationalize these charges and eventually either make them go away all together or have them at a very low per minute rate — for example, $.0007 per minute, which has been accepted by many in the industry as the default rate for the termination of local traffic. The problem is that many mid-sized and smaller local phone companies claim to use these revenues to subsidize local rates in high cost-service areas. As these often rural local carriers offer more IP-based broadband services, questions arise whether these charges should continue at all.