When a significant data breach happens, first responders face significant challenges under extreme pressure. This panel will provide an overview of the current environment in which data breaches are addressed in litigation and regulatory investigations. The panelists will walk you through what happens behind the scenes when a potential breach is identified, investigated and notified and the ensuing regulatory investigations and class action litigation proceedings. Having provided a real-world perspective, the panel will then discuss effective ways to prepare now, so that your company is ready to handle a breach situation well. Panelists will provide concrete examples of measures taken in advance of a breach that make a difference when it happens, including evaluating exposures, reserving and insurance to protect the bottom line; managing vendors and coordinating with others when sensitive data is shared and effective ways to keep your board informed about cybersecurity.
This article shows 10 things you should know about EU data protection reform.
In-house counsel will optimize their role as leaders in information governance by attending this session as they learn the lifecycle of data (collection, use, storage, archiving and destruction) and acquire tools to educate their companies on the risks and benefits associated with data as it travels through that lifecycle. Learn to resolve your company’s information management and governance issues and to add business value by finding information management systems that lower costs and improve efficiencies. Become “litigation-ready” in the face of complex discovery requests.
Trade secrets, customer data, financial records and other confidential information increasingly is under attack. But while most companies focus their security efforts on external threats (i.e. hackers), their greatest security risks may lie within their own company. Employees have access to confidential information, and may understand how to avoid internal security measures. This session will reveal the best practices to protect your company from internal thieves.
This statement is intended to alert financial institutions to specific risk mitigation related to the threats associated with destructive malware.
This is a sample business associate flow chart.
This is an Ohio State University Wexner Medical Center HIPAA breach analysis form.
It’s a bad day, the eve of your company’s merger. You are a high-profile corporate lawyer working for a global brand and you just learned that personal data believed to have been stolen from your cloud computing account has been posted on WhoNeedsTheLaw.com, apparently exposing your name, entire work email inbox, phone number and scandalous images secured by a hacker accessing the camera on your laptop computer. The data includes a private dialogue between you and the outside company about the liabilities of taking on the merger. What would you do? This interactive session will cover emerging executive liability issues and test how effectively you can navigate risk with real-life scenarios and video vignettes.
We live in a world where a wearable fitness tracker can tell you how many steps you’ve walked; your thermostat magically knows how to adjust the temperature in your house when you come home; you can control devices in your home with your phone; medical devices connect to insulin pumps wirelessly and your car logs everything from where you’re going to how many miles you’ve driven on public roads. While the possibilities are endless, they come with myriad legal concerns. This panel will delve into the key legal issues associated with the Internet of Things: privacy, data security and the regulatory perspectives from the Federal Trade Commission, the Food & Drug Administration and the Federal Communications Commission.
There are two kinds of companies: those that have had a security breach and those that will have a security breach. Security incidents present numerous significant risks to companies, including negative brand and reputation attention, loss of sales or customer churn, financial penalties and legal exposure. This session will provide practical guidance from an in-house perspective on the multiple challenges posed by cybersecurity issues, best practices for data protection and steps to take in the event of an information security breach. Topics will also include insurance and vetting third-party vendors.