Apiw / Privacy Panel =

Total Page:16

File Type:pdf, Size:1020Kb

Apiw / Privacy Panel = EVERYONE’S NIGHTMARE PRIVACY AND DATA BREACH RISKS MAY 2014 EDITION This edition is updated as of May 2014. To obtain a copy of this edition by email or to be placed on the mailing list for future editions, please email [email protected]. To learn more about our firm, or our Privacy and Data Protection Practice, please visit edwardswildman.com. BOSTON ♦ CHICAGO ♦ HARTFORD ♦ HONG KONG ♦ ISTANBUL ♦ LONDON ♦ LOS ANGELES ♦ MIAMI ♦ MORRISTOWN NEW YORK ♦ ORANGE COUNTY ♦ PROVIDENCE ♦ STAMFORD ♦ TOKYO ♦ WASHINGTON DC ♦ WEST PALM BEACH This white paper is for guidance only and is not intended to be a substitute for specific legal advice. If you would like further information, please contact the Edwards Wildman Palmer LLP lawyer responsible for your matters. This white paper is published by Edwards Wildman Palmer for the benefit of clients, friends and fellow professionals on matters of interest. The information contained herein is not to be construed as legal advice or opinion. We provide such advice or opinion only after being engaged to do so with respect to particular facts and circumstances. The firm is not authorized under the UK Financial Services and Markets Act 2000 to offer UK investment services to clients. In certain circumstances, as members of the Law Society of England and Wales, we are able to provide these investment services if they are an incidental part of the professional services we have been engaged to provide. Please note that your contact details, which may have been used to provide this bulletin to you, will be used for communications with you only. If you would prefer to discontinue receiving information from the firm, or wish that we not contact you for any purpose other than to receive future issues of this bulletin, please contact us at [email protected]. © 2014 Edwards Wildman Palmer LLP a Delaware limited liability partnership including professional corporations and Edwards Wildman Palmer UK LLP a limited liability partnership registered in England (registered number OC333092) and authorised and regulated by the Solicitors Regulation Authority. Disclosure required under U.S. Circular 230: Edwards Wildman Palmer LLP informs you that any tax advice contained in this communication, including any attachments, was not intended or written to be used, and cannot be used, for the purpose of avoiding federal tax related penalties, or promoting, marketing or recommending to another party any transaction or matter addressed herein. ATTORNEY ADVERTISING: This publication may be considered “advertising material” under the rules of professional conduct governing attorneys in some states. The hiring of an attorney is an important decision that should not be based solely on advertisements. Prior results do not guarantee similar outcomes. Edwards Wildman’s Privacy & Data Protection Group Mark E. Schreiber, Partner, Chair, +1 617 239 0585 Boston [email protected] Steering Committee, Privacy and Data Protection Group Theodore P. Augustinos, Partner, Steering +1 860 541 7710 Hartford [email protected] Committee, Privacy and Data Protection Group Laurie A. Kamaiko, Partner, Steering +1 212 912 2768 New York [email protected] Committee, Privacy and Data Protection Group Sarah Pearce, Partner, Steering +44 (0) 20 7556 4503 London [email protected] Committee, Privacy and Data Protection Group Barry J. Bendes, Partner +1 212 912 2911 New York [email protected] Michael P. Bennett, Partner +1 312 201 2679 Chicago [email protected] Kenneth Choy, Partner +852 2116 6653 Hong Kong [email protected] Mark Deem, Partner +44 (0) 20 7556 4425 London [email protected] Ben Goodger, Partner +44 (0) 20 7556 4188 London [email protected] Edwin M. Larkin, Partner +1 212 912 2762 New York [email protected] Clinton J. McCord, Partner +1 310 860 8715 Los Angeles [email protected] Stephen M. Prignano, Partner +1 401 276 6670 Providence [email protected] Ronie M. Schmelz, Partner +1 310 860 8708 Los Angeles [email protected] Lisa S. Simmons, Partner +1 312 201 2503 Chicago [email protected] Thomas J. Smedinghoff, Partner +1 312 201 2021 Chicago [email protected] David S. Szabo, Partner +1 617 239 0414 Boston [email protected] Barry Leigh Weissman, Partner +1 310 860 8704 Los Angeles [email protected] David L. Anderson, Counsel +1 310 860 8710 Los Angeles [email protected] Patrick J. Concannon, Counsel +1 617 239 0419 Boston [email protected] Sharon Monahan, Counsel +1 202 939 7902 Washington, DC [email protected] Karen L. Booth, Associate +1 860 541 7714 Hartford [email protected] Zachary N. Lerner, Associate +1 212 912 2927 New York [email protected] Jonny McDonald, Associate +44 (0) 20 7556 4620 London [email protected] Ari Moskowitz, Associate +1 202 939 7934 Washington, D.C. [email protected] Matthew Murphy, Associate +1 401 276 6497 Providence [email protected] Jamie Notman, Associate +1 617 235 5303 Boston [email protected] Patrick Peng, Associate +852 3150 1936 Hong Kong [email protected] Erin Pfaff, Associate + 310 860 8717 Los Angeles [email protected] Nicholas A. Secara, Associate +1 212 912 2785 New York [email protected] Ajita Shah, Associate +44 (0) 20 7556 4385 London [email protected] Kayla Tabela, Associate +1 617 239 0734 Boston [email protected] Nora A. Valenza-Frost, Associate +1 212 912 2763 New York [email protected] TABLE OF CONTENTS May 2014 Edition Everyone’s Nightmare: Privacy and Data Breach Risks Page I. INTRODUCTION: THE INCREASING SCOPE OF PRIVACY AND DATA BREACH RISKS ............................................................................................................... 1 II. THE TYPES OF INFORMATION AND PRACTICES AT RISK ................................... 2 1. Personal Information in the U.S. ............................................................................ 2 a. The Expanding Definitions of Personal Information ................................. 4 b. What is Protected Health Information (PHI) .............................................. 6 2. Personal Information in the E.U. and UK .............................................................. 7 3. Breaches of Data Other Than Personal Information .............................................. 8 a. Secrets of All Sorts ..................................................................................... 8 b. Cyber Spies and Hacktivism ...................................................................... 9 c. Cyber Attacks with Physical Effects or Business Disruption as Focus ... 13 4. The Scope of What Constitutes a “Data Breach”: Not Just Electronic – Paper Too ....................................................................................................................... 17 5. Privacy and Data Breach Concerns in Cloud Computing .................................... 18 a. In the United States .................................................................................. 18 b. In the E.U. and Globally ........................................................................... 20 6. Privacy and Data Breach Concerns in Social Media ............................................ 22 a. Social Media as Target and Source of Data Breaches.............................. 23 b. Social Media as Source of Statutory and Regulatory Violations ............. 25 7. Privacy Issues Arising Out of Behavioral Advertising and Online Tracking ...... 29 a. In the United States .................................................................................. 30 (i) The FTC Recommendations ......................................................... 30 (ii) Industry Self-Regulation .............................................................. 31 (iii) Do Not Track Class Actions ......................................................... 32 (iv) Do Not Track Legislation ............................................................. 34 b. E.U. Positions on Online Behavioral Advertising .................................... 35 8. Mobile/Apps as a Growing Exposure .................................................................. 36 -i- TABLE OF CONTENTS (continued) Page 9. The Importance of Privacy Policies ..................................................................... 38 a. The California Example ........................................................................... 38 (i) California’s Shine the Light Law ................................................. 38 (ii) California’s Online Privacy Protection Act ................................. 39 (iii) California’s Social Eraser Law .................................................... 40 10. New Technologies Bring New Risks ................................................................... 41 III. THE U.S. REGULATORY AND STATUTORY LANDSCAPE: OBLIGATIONS UNDER DATA PRIVACY AND SECURITY LAWS AND REGULATIONS ............ 41 1. State Data Privacy and Security Requirements .................................................... 42 a. Restrictions on Collection of Personal Information ................................. 42 b. Protection of Social Security Numbers .................................................... 43 c. Record Disposal Requirements ................................................................ 43 d. Data Breach Notification Requirements..................................................
Recommended publications
  • Saving the Electronic Person from Digital Assault: the Case for More Robust Protections Over Our Electronic Medical Records
    Duquesne Law Review Volume 58 Number 1 Artificial Intelligence: Thinking About Article 8 Law, Law Practice, and Legal Education 2020 Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records Danielle M. Mrdjenovich Follow this and additional works at: https://dsc.duq.edu/dlr Part of the Medical Jurisprudence Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Danielle M. Mrdjenovich, Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records, 58 Duq. L. Rev. 146 (2020). Available at: https://dsc.duq.edu/dlr/vol58/iss1/8 This Student Article is brought to you for free and open access by Duquesne Scholarship Collection. It has been accepted for inclusion in Duquesne Law Review by an authorized editor of Duquesne Scholarship Collection. Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records Danielle M. Mrdjenovich* 1. IN TRODU CTION .............................................................. 147 II. B A CK GROU N D ................................................................ 148 A . HIP A A ................................................................ 148 B . H ITECH A ct ...................................................... 150 C. Current Limitations to HIPAA and the HITECHAct ......................................... 151 D. Recent Cyberattacks at Large Hospitals in the United States .........................
    [Show full text]
  • Data Breach Reports
    CONTENTS Information & Background on ITRC ........... 2 Methodology .............................................. 3 ITRC Breach Stats Report Summary .......... 4 ITRC Breach Stats Report ..........................5 ITRC Breach Report ................................ 42 Information and Background on ITRC Information management is critically important to all of us - as employees and consumers. For that reason, the Identity Theft Resource Center has been tracking security breaches since 2005, looking for patterns, new trends and any information that may better help us to educate consumers and businesses on the need for understanding the value of protecting personal identifying information. What is a breach? The ITRC defines a data breach as an incident in which an individual name plus a Social Security number, driver’s license number, medical record or financial record (credit/ debit cards included) is potentially put at risk because of exposure. This exposure can occur either electronically or in paper format. The ITRC will also capture breaches that do not, by the nature of the incident, trigger data breach notification laws. Generally, these breaches consist of the exposure of user names, emails and passwords without involving sensitive personal identifying information. These breach incidents will be included by name but without the total number of records exposed. There are currently two ITRC breach reports which are updated and posted on-line on a weekly basis. The ITRC Breach Report presents detailed information about data exposure events along with running totals for a specific year. Breaches are broken down into five categories, as follows: business, banking/credit/financial, educational, Government/Military and medical/healthcare. The ITRC Breach Stats Report provides a summary of this information by category.
    [Show full text]
  • Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note
    University of Minnesota Law School Scholarship Repository Minnesota Law Review 2019 Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note Paige Papandrea Follow this and additional works at: https://scholarship.law.umn.edu/mlr Part of the Law Commons Recommended Citation Papandrea, Paige, "Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note" (2019). Minnesota Law Review. 3246. https://scholarship.law.umn.edu/mlr/3246 This Article is brought to you for free and open access by the University of Minnesota Law School. It has been accepted for inclusion in Minnesota Law Review collection by an authorized administrator of the Scholarship Repository. For more information, please contact [email protected]. Note Addressing the HIPAA-potamus Sized Gap in Wearable Technology Regulation Paige Papandrea INTRODUCTION You wake up at 7:00 AM, half an hour late. You rush to get ready, first throwing on your Apple Watch1 and then showering. Your watch records your heart rate at 112 beats per minute and counts exactly seventeen steps from your bedroom to your bath- room. You run to catch the bus at 7:30 AM—your watch tracks your location as you run exactly 0.3 miles to the bus stop. Your heart rate is 155 beats per minute, you ran exactly 600 steps to get there, and burned around twenty-two calories, all tracked by your watch. You sit down, also recorded on your watch. You ar- rive at work at 8:00 AM, sprint up the three flights of stairs, and quickly sit at your desk. Your watch measures your heart rate at 169 beats per minute, updates how many flights of stairs you J.D.
    [Show full text]
  • Event Transcript
    The Walt Disney Company Q2 FY11 Earnings Conference Call MAY 10, 2011 Disney Speakers: Bob Iger President and Chief Executive Officer Jay Rasulo Senior Executive Vice President and Chief Financial Officer Moderated by, Lowell Singer Senior Vice President, Investor Relations PRESENTATION Operator Good day, ladies and gentlemen, and welcome to the second-quarter 2011 Walt Disney Company earnings conference call. My name is Stacy and I will be your conference moderator for today. At this time, all participants are in a listen-only mode. We will conduct a question- and-answer session towards the end of the conference. (Operator Instructions). As a reminder, this conference call is being recorded for replay purposes. Page 1 The Walt Disney Company Q2 FY11 Earnings May 10, 2011 Conference Call I would now like to turn the presentation over to your host for today, to Mr. Lowell Singer, Senior Vice President of Investor Relations. Please proceed. Lowell Singer – Senior Vice President, Investor Relations, The Walt Disney Company Okay. Thank you, and good afternoon, everyone. Welcome to The Walt Disney Company's second quarter earnings call. Our press release was issued almost an hour ago. It's now available on our website at www.Disney.com/investors. Today's call is also being webcast and the webcast will be on the website after the call. Finally, a replay and transcript of today's remarks will be available on the website as well. Joining me in Burbank for today's call are Bob Iger, Disney's President and Chief Executive Officer, and Jay Rasulo, Senior Executive Vice President and Chief Financial Officer.
    [Show full text]
  • Internet Security in Companies!
    !! SIFA Vänersborg, Sweden 2015 INTERNET SECURITY IN COMPANIES! Nowadays, many companies have suffered from cyber attacks, that’s why it is important for them to properly secure their data and protect their employees and customers information. ! Useful Words! Introduction & general overview! Malicious Code: Program which causes Introduction & general overview! Internet safety nowadays has become internal damage to a computer network.! Consumer information, employee a serious and sometimes dangerous ! records, proprietary and trade secret issue for the users and the Spear Phishing: Spear phishing is an information, and intellectual property are companies.Internet security is all about email that appears to be from an all available for the taking if trust at a distance. That is because you individual or business that you know but infrastructures are not properly protected are dealing with everyone remotely and it isn’t.! and contingency plans developed should not able to confirm identity or ! a breach occur. While many businesses authenticity in the traditional sense. WPA: The name for a number of standards may understand the potential threat they Even with secure connections, to use encryption on a Wireless LAN.! are often not prepared to deal with an encryption, and the various other ! incident, or they naively believe it will Cyber Attack: Cyber-attack is any type of authentication schemes there is always never happen to them.It is not simply a a way to spoof identity, provide forged offensive maneuver employed by individuals or whole organizations that technical issue and can impact documents or credentials, hold targets computer information systems, customers, employees business computers and servers hostage to infrastructures, computer networks, and/or associates and the public perception of “ransomware” or allow cyber-criminals to be whoever they want to be.
    [Show full text]
  • Innovation and Investment: Building Tomorrow’S Economy in the Bay Area
    Innovation and Investment: Building Tomorrow’s Economy in the Bay Area Bay Area Economic Profile March 2012 Eighth in a Series Bay Area Council Economic Institute 201 California Street, Suite 1450, San Francisco, CA 94111 (415) 981-7117 Fax (415) 981-6408 www.bayareaeconomy.org [email protected] Innovation and Investment: Building Tomorrow’s Economy in the Bay Area Bay Area Economic Profile March 2012 Eighth in a Series Innovation and Investment: Building Tomorrow’s Economy in the Bay Area Introduction This report, the eighth in a series of biennial Bay Area Economic Profile reports produced by the Bay Area Council Economic Institute in partnership with McKinsey & Company, examines the evolution of the Bay Area’s econ- omy in the wake of the Great Recession that severely impacted the region from 2008 to 2010 and continues to be felt by many of our citizens and busi- nesses. As previous profile reports have done, it benchmarks the Bay Area’s economic performance against other knowledge-based economies in the United States and around the world, to assess the region’s national and global competitiveness. It also analyzes the economic and policy challenges that continue to confront the region and that must be addressed if the Bay Area wishes to maintain its current position of economic leadership. This year’s Bay Area Economic Profile report finds, as it has so often in the past, that the region has experienced a substantial economic recovery and remarkable economic growth based on its ability to innovate across a range of leading sectors. This strength in innovation continues to position it fa- vorably as both a partner and a competitor with leading economic regions throughout the world.
    [Show full text]
  • A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? Abdelberi Chaabane, Yuan Ding, Ratan Dey, Mohamed Ali Kaafar, Keith Ross
    A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? Abdelberi Chaabane, Yuan Ding, Ratan Dey, Mohamed Ali Kaafar, Keith Ross To cite this version: Abdelberi Chaabane, Yuan Ding, Ratan Dey, Mohamed Ali Kaafar, Keith Ross. A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?. PAM 2014 - 15th International Conference on Passive and Active Measurement, Mar 2014, Los Angeles, United States. hal-00939175 HAL Id: hal-00939175 https://hal.inria.fr/hal-00939175 Submitted on 30 Jan 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? Abdelberi Chaabane1, Yuan Ding2, Ratan Dey2, Mohamed Ali Kaafar1;3, Keith W. Ross2 1INRIA, France 2 Polytechnic Institute of NYU, USA 3 NICTA, Australia Abstract. We examine third-party Online Social Network (OSN) applica- tions for two major OSNs: Facebook and RenRen. These third-party applica- tions typically gather, from the OSN, user personal information. We develop a measurement platform to study the interaction between OSN applications and fourth parties. We use this platform to study the behavior of 997 Face- book applications and 377 RenRen applications.
    [Show full text]
  • Interactive Entertainment and Internet Segments Are Converging, Entertainment Shifting the Landscape of the Traditional Video Game Market
    North America TMT Internet FITT Research Company Company 31 October 2010 Fundamental, Industry, Thematic, Thought Leading Deutsche Bank’s Research Product Interactive Committee has deemed this work F.I.T.T. for investors seeking differentiated ideas. The Interactive Entertainment and Internet segments are converging, Entertainment shifting the landscape of the traditional video game market. Digital, social and mobile gaming are emerging as the next major drivers of the interactive gaming space in the US over the next several years. The social and massively multi- player segments should also offer an attractive opportunity for monetization of Extending Game Play to the virtual goods, one of the fastest-growing segments in the space. Masses... beyond the console Fundamental: Growth Driven by Penetration of the Long Tail Global Markets Research Industry: We see Nearly a $30bn US Market Opportunity by 2014 Thematic: Digital, Social and Mobile are Key Emerging Themes Thought Leading: Adoption, Engagement, and Monetization Phases We Favor Activision Blizzard for Digital Position and Google for its Android Platform for Mobile Gaming Jeetil Patel Herman Leung Matt Chesler, CFA Research Analyst Research Analyst Research Analyst (+1) 415 617-4223 (+1) 415 617-3246 (+1) 212 250-6170 [email protected] [email protected] [email protected] Deutsche Bank Securities Inc. All prices are those current at the end of the previous trading session unless otherwise indicated. Prices are sourced from local exchanges via Reuters, Bloomberg and other vendors. Data is sourced from Deutsche Bank and subject companies. Deutsche Bank does and seeks to do business with companies covered in its research reports.
    [Show full text]
  • The Video Games Industry
    The video games industry: A responsible attitude towards parents and children October 2011 Executive Summary The Association for UK Interactive Entertainment (UKIE) is the trade association that represents a wide range of businesses and organisations involved in the video games industry. UKIE exists to ensure that our members have the right This document aims to set out what the video games and economic, political and social environment needed for this interactive entertainment is doing in the field of child safety. expanding industry to continue to thrive. UKIE’s membership The focus of this report is the following games consoles: includes games publishers, developers and the academic Nintendo Wii, Nintendo DS, Microsoft Xbox, Sony2 PlayStation institutions that support the industry. We represent the and Sony Playstation Portable. majority of the UK video games industry: in 2010 UKIE members were responsible for 97% of the games sold as physical products in the UK and UKIE is the only trade body Parental Controls on video games consoles in the UK to represent all the major console manufacturers (Nintendo, Microsoft and Sony). Tanya Byron’s Review of Progress (2010) urged internet- enabled device manufacturers to develop parental controls and include them on their devices. Similarly, the Bailey Introduction Review (2011) made the following recommendations regarding parents’ ability to block adult and age-restricted The video games and interactive entertainment industry material from the internet: is one of the fastest growing creative industries in the UK. With 1 in 3 people identifying as “gamers”, interactive “the internet industry must act decisively to develop entertainment is increasingly part of everyone’s everyday and introduce effective parental controls.” lives.
    [Show full text]
  • The Walt Disney Company: a Corporate Strategy Analysis
    The Walt Disney Company: A Corporate Strategy Analysis November 2012 Written by Carlos Carillo, Jeremy Crumley, Kendree Thieringer and Jeffrey S. Harrison at the Robins School of Business, University of Richmond. Copyright © Jeffrey S. Harrison. This case was written for the purpose of classroom discussion. It is not to be duplicated or cited in any form without the copyright holder’s express permission. For permission to reproduce or cite this case, contact Jeff Harrison at [email protected]. In your message, state your name, affiliation and the intended use of the case. Permission for classroom use will be granted free of charge. Other cases are available at: http://robins.richmond.edu/centers/case-network.html "Walt was never afraid to dream. That song from Pinocchio, 'When You Wish Upon a Star,' is the perfect summary of Walt's approach to life: dream big dreams, even hopelessly impossible dreams, because they really can come true. Sure, it takes work, focus and perseverance. But anything is possible. Walt proved it with the impossible things he accomplished."1 It is well documented that Walt Disney had big dreams and made several large gambles to propel his visions. From the creation of Steamboat Willie in 1928 to the first color feature film, “Snow White and the Seven Dwarves” in 1937, and the creation of Disneyland in Anaheim, CA during the 1950’s, Disney risked his personal assets as well as his studio to build a reality from his dreams. While Walt Disney passed away in the mid 1960’s, his quote, “If you can dream it, you can do it,”2 still resonates in the corporate world and operations of The Walt Disney Company.
    [Show full text]
  • Strengthening Protection of Patient Medical Data
    REPORT SURVEILLANCE & PRIVACY Strengthening Protection of Patient Medical Data JANUARY 10, 2017 — ADAM TANNER This report is supported in part by a grant from the Open Society Foundations. PAGE 1 Americans seeking medical care expect a certain level of privacy. Indeed, the need for patient privacy is a principle dating back to antiquity, and is codified in U.S. law, most notably the Privacy Rule of the 1996 Health Insurance Portability and Accountability Act (HIPAA), which establishes standards that work toward protecting patient health information. But the world of information is rapidly changing, and in this environment, U.S. rules fall precariously short in protecting our medical data. What many patients do not know is that, today, much of their health information is routinely sold and traded—in anonymized form—to third parties in for-profit commerce unrelated to their specific treatment. After a person gets medical care, pharmacies, insurers, labs, electronic record systems, and the middlemen connecting all these entities automatically transmit patient data directly to what is, in effect, a big health data bazaar. This trade—which has nothing to do with the individual’s treatment or insurance processing—is allowed by HIPAA privacy rules only if the patient’s name is removed. The result is a blizzard of transactions hidden to the public in which companies—called data miners— buy, sell, and barter anonymized but intimate profiles of hundreds of millions of Americans. Such secondary use of patient data can have good intentions. For example, massive anonymized patient databases can help pharmaceutical companies develop and market effective drugs and treatments.
    [Show full text]
  • Disney Interactive
    Terms of Use Last Updated: July 10, 2014 Disney Interactive is pleased to provide to you its sites, software, applications, content, products and services (“Disney Services”), which may be branded Disney, ABC, ESPN, Marvel, Lucasfilm, Club Penguin, Playdom or another brand owned or licensed by The Walt Disney Company. These terms govern your use and our provision of the Disney Services on which these terms are posted, as well as Disney Services we make available on third-party sites and platforms if these terms are disclosed to you in connection with your use of the Disney Services. PLEASE READ THESE TERMS CAREFULLY BEFORE USING THE DISNEY SERVICES. ANY DISPUTE BETWEEN YOU AND US MUST BE RESOLVED BY INDIVIDUAL BINDING ARBITRATION. PLEASE READ THE ARBITRATION PROVISION IN THESE TERMS AS IT AFFECTS YOUR RIGHTS UNDER THIS CONTRACT. NOTHING IN THESE TERMS IS INTENDED TO AFFECT YOUR RIGHTS UNDER THE LAW IN YOUR USUAL PLACE OF RESIDENCE. IF THERE IS A CONFLICT BETWEEN THOSE RIGHTS AND THESE TERMS, YOUR RIGHTS UNDER APPLICABLE LOCAL LAW WILL PREVAIL. 1. Contract between You and Us This is a contract between you and Disney Interactive, a California corporation located at 500 South Buena Vista Street, Burbank, California 91521, USA, or between you and any different service provider identified for a particular Disney Service. You must read and agree to these terms before using the Disney Services. If you do not agree, you may not use the Disney Services. These terms describe the limited basis on which the Disney Services are available and supersede prior agreements or arrangements.
    [Show full text]