This article addresses the three broad topics that many Boards of Directors are examining as they review and assess cybersecurity issues.
It’s a bad day, the eve of your company’s merger. You are a high-profile corporate lawyer working for a global brand and you just learned that personal data believed to have been stolen from your cloud computing account has been posted on WhoNeedsTheLaw.com, apparently exposing your name, entire work email inbox, phone number and scandalous images secured by a hacker accessing the camera on your laptop computer. The data includes a private dialogue between you and the outside company about the liabilities of taking on the merger. What would you do? This interactive session will cover emerging executive liability issues and test how effectively you can navigate risk with real-life scenarios and video vignettes.
In this ACC guide (InfoPAK) for advanced practitioners with a basic understanding of technology agreements, employment agreements, and commercial lease agreements, learn practical tips for addressing important issues that frequently arise in these areas, and gain critical guidance and necessary best practices designed to help businesses achieve their commercial goals.
Proper management of personal information is key to customer confidence, trust and business reputation. This Top Ten presents key tips regarding data privacy in Australia.
This Top Ten presents practical tips for preparing and managing a software audit in the United States.
The Relationship of Big Data, Information Governance, and Data Governance presentation to the Information Governance Committee on July 16, 2015.
Employees are the front line of your information security defense. While technological protections are essential (for example, antivirus software, firewalls, spam filters, etc.), none are as effective as a vigilant end user. These are checklists of measures of which every user should be aware.
The purpose of this table is to: 1) list the countries in the European Union that have a comprehensive data protection law (columns 1 and 2); 2) summarize the notification and/or registration requirements with the competent data protection authority in these countries and explain where exemptions to notify/register may exist (columns 3 and 4); and 3) specify the countries where it is required to notify individuals about the collection and processing of their personal data (column 5).
This Leading Practices Profile, which updates 2010’s Leading Practices in Privacy and Data Protection: What Companies Are Doing, examines the data security and privacy practices of six companies with operations spanning the globe.
In this interactive workshop a panel of experts provides practical tips and guidance on data breach obligations and associated notification requirements, how to address data breach in contracts, how to deal with bad leavers and protect trade secrets, corporate spying and the impact of European human rights legislature.