This sample outlines the provisions that are applicable to company employees who are authorized to connect a smartphone or other mobile computing device to the company network.
In this article, learn the more material changes brought about by the GDPR (those likely to have a bigger impact), comments on the likely impact of the proposal on businesses, and suggests action points that businesses can begin to address in the lead-up to the measure coming into force.
This Top Ten addresses aspects of Colombian data protection law that your company should take into account when establishing a business in Colombia, since most of the companies will handle Personal Data (at least employees data) and therefore will have to comply with the Data Protection Law and its regulations.
This Quick Overview discusses how businesses must be prepared to handle the risks and consequences of storing large quantities of customer and client personal information digitally in the United States.
This checklist consists of a non-exhaustive set of questions that in-house counsel may wish to know the answers to prior to approving any technology agreements for their clients.
The type of reports that may be requested from consumer reporting agencies under this policy include but are not limited to criminal records, motor vehicle reports, credit checks, reference checks, education verification, employment verification, and professional license or certification verification.
This sample is divided into three sections: (1) the formal company requirements related to company data, the internet and email, (2) the company portal site (intranet), and (3) social media guidelines when posting or reacting to comments or pictures about the company on collaborative websites (i.e., Facebook, Twitter, You Tube, My Space, Flickr, etc.)
This questionnaire and guide to law firm cybersecurity has been prepared to assist corporate counsel in thinking about the key issues and addressing them with outside counsel.
To create a privacy program that meets compliance demands and customers’ expectations, there are four main areas you will need to address: getting your C-suite’s attention without the “help” of law enforcement or regulators, determining what resources are already in place to prevent the worst, prioritizing what is most important for your company to avoid disaster and putting together a long-term, defensible strategy. In this session, learn ways to build trust, design a defensible program and create a lasting privacy culture.
Taking a cue from the popular TV show 24, the Health Law Committee plans to solve a US Health Insurance Portability and Accountability Act (HIPAA) breach in 90 minutes. In this interactive session, panelists will take on various roles, like CEO, CIO, security officer, privacy officer, compliance officer and general counsel, as they take the audience through simulated breach scenarios involving protected health information. Garner substantive information and practical tips for managing HIPAA incidents and data breaches as the speakers are challenged in real time to address the details provided by attendees.