The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”)1 and its implementing regulations (the “Privacy Rule”, the “Breach Notification Rule” and the “Security Rule”)2 establish security and privacy standards to ensure the confidentiality and integrity of Protected Health Information (“PHI”).3 Their application to Business Associates is summarized here.
As more companies go global, in-house counsel must manage litigation where a foreign entity is sued in the United States or litigate a matter in Europe. Not only must in-house counsel educate overseas managers about the reality of litigation in the United States and learn various rules abroad, but they also face the difficult task of determining what is discoverable and how to conduct investigations to comply with the demands of US courts and stringent EU data and privacy regulations. This panel will focus on highlighting the differences between the key stages of litigation in the European Union and the United States, using real-world examples to help in-house counsel better prepare to deal with the practical implications of litigation involving multiple jurisdictions.
This paper continues to focus on Europe, which has long viewed the privacy of personal information and data as a fundamental right.
The Gullible Assistant. The Careless Vendor. The Imperious Boss. The Road Warrior. The Absent-Minded Executive. The Social Butterfly. Every organization has horror stories about people who bypass, ignore, forget or blatantly run roughshod over IT security policies and procedures. While trying to find the right balance between security and employee accessibility, IT sometimes exposes the organization to elevated risk. Before you know it, it’s legal’s problem. This “Family Feud” style session will test the audience’s knowledge of potential cyber risks and possible solutions to manage each scenario. Key takeaways will include strategies and tactics for mitigating threats from “the Human Element,” improving security without constricting access or employee flexibility and running a tighter ship without negatively impacting the workplace culture or environment.
Because social media law is a hybrid of a number of practice areas, this session will feature panelists familiar with social media issues in their most frequent corporate applications: labor and employment, advertising and endorsements and corporate law (including mergers and acquisitions). The panelists will cover issue spotting and reveal suggested guidelines for minimizing legal risks from social media activity by the company and its employees.
In this ACC guide (InfoPAK) for advanced practitioners with a basic understanding of technology agreements, employment agreements, and commercial lease agreements, learn practical tips for addressing important issues that frequently arise in these areas, and gain critical guidance and necessary best practices designed to help businesses achieve their commercial goals.
Proper management of personal information is key to customer confidence, trust and business reputation. This Top Ten presents key tips regarding data privacy in Australia.
The Relationship of Big Data, Information Governance, and Data Governance presentation to the Information Governance Committee on July 16, 2015.
This Leading Practices Profile, which updates 2010’s Leading Practices in Privacy and Data Protection: What Companies Are Doing, examines the data security and privacy practices of six companies with operations spanning the globe.
This policy describes how the use of Devices for work purposes is subject to the Company’s approval and its rules and conditions concerning the use and maintenance of such devices.