IDENTITY THEFT AND DATA BREACH CONFERENCE 2016
|
|
- Jonathan Phelps
- 8 years ago
- Views:
Transcription
1 IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President - Canadian Identity Theft Prevention Association 9:00am 10:00am Keynote Speaker Privacy and Data Breaches New Legislation and Mandatory Reporting 10:00am 10:15am 10:15am 11:45am Panel 1: Understanding Data Breaches This opening panel will provide attendees with a high level yet comprehensive review of the top strategies being employed by identity criminals, the most up-to-date trends and the wide scope of impacts that data breaches have on both organizations and the public
2 at large. Each speaker will examine data breaches from the following three streams; IT, Policy/Legal, and Victims/Clients. Moderator: Darrell Evans President, Canadian Institute of Information and Privacy Studies and Founder of the BC Freedom of Information and Privacy Association 1. IT Speaker To be announced 2. Policy / Legal Speaker Pippa Lawson - Barrister & Solicitor; Consultant at Philippa Lawson, Barrister & Solicitor. Legal counsel for the Yukon Government 3. Victims / Clients Stream Speaker Dr. Sue Sproule - Assistant Professor - Information Systems Brock University. Co-author of Identity Theft and Fraud: Evaluating and Managing Risk 11:45am 1:00pm Lunch Keynote Dr. Ann Cavoukian Executive Director of the Privacy and Big Data Institute at Ryerson University and former Information and Privacy Commissioner of Ontario. (Appearing via video) 1:00pm 2:30pm Panel 2 Understanding the New Canadian Data Breach Notification Legislation This second panel will focus on the recently legislated Data Protection Act which amends the Personal Information Protection and Electronics Documents Act (PIPEDA) creating new substantial legal requirements and operational procedures for organizations to design and implement. Each panelist will examine the new Canadian data breach legislation from the following three streams; IT, Policy/Legal, and Victims/Clients. Moderator: Tamir Israel, Staff Lawyer - Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Cara-Lynn Stelmack, Director, Mediation and Investigation Team - The Office of the Information and Privacy Commissioner of Alberta 2. Office of the Privacy Commissioner of Canada Staff To be announced
3 2:30pm 3:00pm Special Presentation 3:00pm 3:15pm 3:15pm 4:45pm out Session 1: Preparing For And Preventing A Data Breach These 3 out Sessions will allow conference attendees to focus in on their specific areas of responsibility within the three programmed streams of IT, Public Policy and Victims/Clients. IT out Session Advanced IT and security solutions You're in the privileged position of preparing for and preventing a data breach. What specific steps should you take? In this session, we'll discuss industry best practices with real world solutions. Moderator: Kris Constable, Senior Advisor & Privacy Officer - PrivaSecTech 1. IT Specialist 2. IT Security Specialist Policy and Law out Session Emerging liability framework and standards for data security This breakaway session will explore emerging regulatory, common law and professional obligations and standards for data security in the legal, government and private sectors. Moderator: David Fewer, Executive Director, Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Law Society TBA 2. Government Standards TBA 3. Senior Legal Counsel - TBA
4 Victim / Client out Session Developing strategies to help protect your clients from becoming victims This breakaway session will explore four key strategies to prepare your organization for a data breach with regards to your clients, members and employees from becoming victims. 1st Strategy Engage and educate your clients, members and employees on best practices to ensure they have the necessary knowledge and tools to proactively lockdown their personal information. 2nd Strategy Develop a comprehensive communications and notification strategy for your clients/members and employees to be implemented in the event of a data breach as legislated by the newly enacted Data Privacy Act. 3rd Strategy - Create a crisis communications strategy and incident response plan. 4th Strategy Develop a victim support plan. Moderator: Darrell Evans - President of The Canadian Institute of Information and Privacy Studies and Founder of the BC Freedom of Information and Privacy Association 1. Jim Dorey, Executive Director of the Canadian Identity Theft Support Centre 2. Pippa Lawson - Barrister & Solicitor; Consultant at Philippa Lawson, Barrister & Solicitor. Legal counsel for the Yukon Government 3. Canadian Bankers Association TBA 4:45pm 5:00pm Day Closing Remarks Day 2 - Friday January 29, :30am 9:00am Registration
5 9:00am 9:15am Opening Remarks Conference Chair Kevin M. Scott, President - Canadian Identity Theft Prevention Association 9:15am 10:15am Key Note Minister of Department of Justice or Minister of Industry - TBA 10:15am 10:30am 10:30am 12:00pm Panel 3 - You ve Been Breached, What Now? This final panel will focus on the worst case scenario your organization has suffered a data breach. Upon entering this crisis situation your organization must be positioned to implement a multitude of critical actions in order to mitigate the potential harms to the public, your brand and your bottom line. The speakers on this panel will provide an overview of an overarching strategy that must be deployed at the first sign of a data breach. This high level strategic plan will include IT, legal, public relations and victims strategies. Moderator: Kevin M. Scott, President - Canadian Identity Theft Prevention Association 1. IT Expert TBA 2. Legal Expert - John Russo, Vice President Legal Counsel & Chief Privacy Officer, Equifax Canada 3. Public Relations Expert - Principal, Earnscliffe Strategy Group 12:00 1:30 Lunch - Keynote Speaker TBA 1:30 3:30 out Session 2: All Hands on Deck You ve Been Breached
6 These out Sessions will allow conference attendees to focus in on their specific areas of responsibility within the three programmed streams of IT, Public Policy and Victims/Clients. IT out Session Solutions for an organizational nightmere The dreaded call has come in, you've been breached. If you're not prepared, you won't know who to call or what to do next. It can also be very expensive to resolve and timimg is everything. In this session, you will hear real world experiences, as well as be provided a list of steps, with tips and tricks to minimize the impact and lockdown your organization. The panel will have both the experiences of those who've been breached, and those who have done the breaching. Moderator: Kris Constable, Senior Advisor & Privacy Officer - PrivaSecTech 1. Professional IT Specialist - TBA 2. Renowned Hacker and Security Expert - TBA Policy and Law out Session Security reporting, harm mitigation obligations and blackmail! As 100% security is impossible, you may face a breach regardless of what steps you take. When that occurs, you may face a range of complex issues. Should a discovered security vulnerability be reported? Would doing so cause harm by exposing other systems? Are there any obligations to mitigate potential harm to affected customers or clients and how far might these obligations go? What obligations might arise in extreme situations involving ransomeware or other types of blackmail? Moderator: Tamir Israel, Staff Lawyer - Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Legal Expert TBA 2. Policy Expert TBA 3. Security Specialist - TBA Victim / Client out Session You ve been breached and it time to take immediate action. In this session the speakers will focus on how to design a 72 hour and a follow-up 30- day implementation strategy on how to ensure your organization is able to respond
7 effectively and efficiently to the breach. This will include direct communication with your customers, a crisis communications strategy and a plan reduce the likelihood that your clients will become victims of identity theft. Moderator: Darrell Evans, President of The Canadian Institute of Information and Privacy Studies and Founder, BC Freedom of Information and Privacy Association 1. Tim Ashby - Vice President, Equifax Canada 2. Jim Dorey - Executive Director, Canadian Identity Theft Support Centre 3. Principal - Earnscliffe Strategy Group. Crisis Communications Specialist 3:30pm 3:45pm 3:45pm 4:45pm Plenary Kevin M. Scott, President - Canadian Identity Theft Prevention Association 4:45pm 5:00pm Closing Remarks Kevin Scott President Canadian Identity Theft Prevention Association
Table of Contents. Acknowledgement
OPA Communications and Member Services Committee February 2015 Table of Contents Preamble... 3 General Information... 3 Risks of Using Email... 4 Use of Smartphones and Other Mobile Devices... 5 Guidelines...
More informationKEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT
OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 8 focused webinars for the latest legal developments, including: Session 1: September 16,
More informationResponding to Data Breaches. March 25, 2015
Better breach response how to be good when things go bad Ian Dick Dan Michaluk Better breach response The Rules of Professional Conduct The basis for good breach response Incident response planning Notification,
More informationIdentity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota
1 Identity Theft Regulation *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota (605) 455-6110 csarmiento@olc.edu Introduction This
More informationINDUSTRY GUIDE TO FINANCIAL PLANNING WEEK
INDUSTRY GUIDE TO FINANCIAL PLANNING WEEK Tips, Tools & Opportunities to Help Your Organization Make the Most of Financial Planning Week FINANCIAL PLANNING WEEK provides a significant opportunity for your
More informationThis procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
More informationBill S-4, An Act to amend the Personal Information Protection and Electronic Documents Act and to make a consequential amendment to another Act
2 Carlton Street, Suite 701 Toronto, Ontario M5B 1J3 Tel: (416) 598-2656 Fax: (416) 598-7924 www.acelaw.ca Chair, Board of Directors Lyndsay O Callaghan Lawyers Judith A. Wahl, B.A., LL.B. Rita A. Chrolavicius,
More informationIssue #5 July 9, 2015
Issue #5 July 9, 2015 Breach Response Plans by Lyndsay A. Wasser, CIPP/C, Co-Chair Privacy Privacy breaches can occur despite an organization s best efforts to prevent them. When such incidents arise,
More informationDoing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
More informationHow to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
More informationIndividuals affected by the breach How many individuals are affected by the breach? Who was affected by the breach: employees, public, contractors, clients, service providers, other organizations? Foreseeable
More informationPersonal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
More informationID Fraud & Law Reform
ID Fraud & Law Reform Philippa Lawson, Director Canadian Internet Policy and Public Interest Clinic University of Ottawa, Faculty of Law www.cippic.ca BC FIPA Privacy and ID Theft Conference Vancouver,
More informationCYBER LIABILITY CLAIMS
CYBER LIABILITY CLAIMS TRENDS AND DEVELOPMENTS IN THE U.S. AND CANADA Animateur / Moderator: Daniel Desjardins, Senior Director Global Risk Management & Insurance, Bombardier Inc. Conférenciers / Speakers:
More informationThe Manitoba Child Care Association PRIVACY POLICY
The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information
More informationBig Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi
Big Data, Big Risk? Data Management and Privacy Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Data Management & Privacy Compliance Heather Innes Chief Privacy Officer, General Motors
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationINVESTIGATION REPORT 173-2015
Saskatchewan Government Insurance November 12, 2015 Summary: Saskatchewan Government Insurance (SGI) proactively reported to the Office of the Information and Privacy Commissioner (OIPC) that it had received
More informationPrivacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
More informationAnatomy of a Privacy and Data Breach
Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationerisks Policyholder s Guide to Privacy & Security Breach Response Planning
erisks Policyholder s Guide to Privacy & Security Breach Response Planning Professional Indemnity Financial Institutions Directors & Officers Management Liability Medical Malpractice Media Liability Level
More informationCharities and Not-for-Profit Law Conference 2009 Learn how to protect, strengthen, and guide your organization!
Charities and Not-for-Profit Law Conference 2009 Learn how to protect, strengthen, and guide your organization! Friday, February 13, 2009 There are three learning options for this course: 1. a face-to-face
More informationProcedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationPrivacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
More informationCANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
More information28 th Annual Clinical Negligence Conference
SPONSORSHIP & EXHIBITION OPPORTUNITIES at the event for clinical negligence specialists 28 th Annual Clinical Negligence Conference 1 st 2 nd July 2016, Hilton Brighton Metropole Action against Medical
More informationVictimization by Credit Card Fraud and Identity Theft in Kentucky 2008
Victimization by Credit Card Fraud and Identity Theft in Kentucky 2008 Dr. David May Emily Raine Eastern Kentucky University Acknowledgement The data used in this presentation were collected as part of
More informationHelping to protect your business and your customers in the event of a data breach
Helping to protect your business and your customers in the event of a data breach Equifax Data Breach Assistance helps you respond more quickly and effectively, limiting the reputational damage to your
More informationCyber Liability Insurance:
Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major
More informationOnline Privacy: Make Youth Awareness and Education a Priority
Online Privacy: Make Youth Awareness and Education a Priority Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada For young people today, going online to connect and interact with
More informationPrivacy Law in Canada
by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually
More informationTaking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
More informationOffice of the Information and Privacy Commissioner Province of British Columbia Order No. 16-1994 July 8, 1994
Office of the Information and Privacy Commissioner Province of British Columbia Order No. 16-1994 July 8, 1994 INQUIRY RE: A Request for Access to Records of the Insurance Corporation of British Columbia
More information2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security
2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security Commissioned by ID Experts November 2009 INTRODUCTION Healthcare breaches are on the rise; according to the 2009
More informationDirectory of Records. Workers Compensation Board Alberta
Directory of Records Workers Compensation Board Alberta Last updated: May 2005 Table of Contents WCB Mandate...3 Organization...3 Introduction...4 How the Directory is Organized...4 Access Point...4 Business
More informationHelpful Tips. Privacy Breach Guidelines. September 2010
Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information
More informationCyber Risk and the Utility Industry
Cyber Risk and the Utility Industry Imran Ahmad Lawyer, Cassels Brock & Blackwell LLP Canadian Legal Landscape Personal Information Protection and Electronic Documents Act (PIPEDA) Federal legislation
More informationDATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
More informationData Breach Readiness
Data Breach Readiness 877.983.9850 Partner@Intersections.com www.intersections.com Introduction Few events can damage a company s reputation more than losing the personal confidential information entrusted
More informationNOT-FOR-PROFIT FINANCE LEADERSHIP DAY THURSDAY, NOVEMBER 12, 2015 CHELSEA HOTEL, TORONTO FINANCE AND STRATEGY
NOT-FOR-PROFIT FINANCE LEADERSHIP DAY THURSDAY, NOVEMBER 12, 2015 CHELSEA HOTEL, TORONTO FINANCE AND STRATEGY For Professionals. By Professionals. Your Pathway To Success. CPA Ontario s Not-for-Profit
More informationPrivacy by Design Setting a new standard for privacy certification
Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,
More informationOnline privacy and identity A regulatory body s perspective
Online privacy and identity A regulatory body s perspective April 21, 2008, Montreal, QC Internet Use and the Norm o $50 million in sales to Canadians o 10 million Canadians use social networking sites
More informationCURRICULUM VITAE. Telephone: 416-366-3811 E -Mail: TBW@ToddWhiteLaw.Com. TODD WHITE is a senior Toronto criminal lawyer.
CURRICULUM VITAE TODD BRETT WHITE, B.A. (Hons), LL.B. Barrister Canada Life Building 330 University Avenue Fifth Floor Toronto, Ontario, Canada M5G 1R7 Telephone: 416-366-3811 E -Mail: TBW@ToddWhiteLaw.Com
More informationReal Estate Council of Alberta. An introduction 1
Real Estate Council of Alberta An introduction 1 2 Real Estate Council of Alberta - An introduction Welcome At the heart of Alberta s real estate industry is an organization where people work cooperatively
More informationCARIBBEAN SOCIAL MEDIA MARKETING SUMMIT 2015
ASSOCIATION OF CARIBBEAN CORPORATE COUNSEL ( ACCC ) PRESENTS ITS CARIBBEAN SOCIAL MEDIA MARKETING SUMMIT 2015 24 TH JULY 2015 Courtyard Marriott, Port of Spain, Trinidad 7:45AM - 8:45AM REGISTRATION CHECK
More informationAftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
More informationDavid A. Bertschi Partner
Call to the Bar: Ontario 1985 Languages: English French Education LL.B., University of Windsor, Windsor, Ontario (1983) B.A., Carleton University, Ottawa, Ontario (1980) Areas of Practice Insurance litigation
More informationBrief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft
Canadian Internet Policy and Public Interest Clinic Clinique d intérêt public et de politique d internet du Canada Brief to the House of Commons Standing Committee on Access to Information, Privacy and
More informationD EBORAH C. A NSCHELL
D EBORAH C. A NSCHELL 128 Ledbury St. Toronto, ON M5M 4H9 Res: 416.322.8066 e-mail: deborah@anschell.com BAR ADMISSIONS Admitted to the Law Society of British Columbia on August 27, 1993 Admitted to the
More informationREDEFINING THE BOUNDARIES OF RISK MANAGEMENT, NOW AND INTO THE FUTURE
CYBER RISKS SECURITY BREACH CHECKLIST REDEFINING THE BOUNDARIES OF RISK MANAGEMENT, NOW AND INTO THE FUTURE STEP 1 UNDERTAKE PRELIMINARY ASSESSMENT OF THE INCIDENT A serious data security breach is described
More informationCURRICULUM VITAE. BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada)
CURRICULUM VITAE BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada) HELLER, RUBEL Barristers 120 Adelaide Street West Suite 1902 Toronto, Ontario M5H 1T1 business:
More informationPreliminary Agenda As of Friday, April 15, 2016
Preliminary Agenda As of Friday, April 15, 2016 Monday, April 25 2:00pm 6:30pm 2:00pm 2:45pm Registration 101 Overview Sessions Join IRI, DTCC and ACORD for an update on today s industry workgroups and
More informationA Year in Review: CIHI s 2013 2014 Annual Privacy Report
A Year in Review: CIHI s 2013 2014 Annual Privacy Report Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated
More informationCloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
More informationWhite Paper on Financial Industry Regulatory Climate
White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during
More informationTitle. Key Issues in Privacy and Information Management Webinar Series - Session 7: Big Data: Current and Emerging Privacy Issues 1.25 0.
LSUC (ON) CPD 2014 ***For information regarding CPD/MCLE Hours for past OsgoodePD Programs for other Canadian jurisdictions or the NY Bar, please contact cpd@osgoode.yorku.ca Date Title Substantive (Hours)
More informationPut your Head in the Cloud at Phorum
Put your Head in the Cloud at Phorum There is no question that cloud computing and cloud strategies are at the forefront of many business leaders minds and budgets. CxOs have their heads in the clouds,
More informationPrivacy in the Workplace Update What You Don t Know May Hurt You
McCarthy Tétrault Advance Building Capabilities for Growth Privacy in the Workplace Update What You Don t Know May Hurt You Rosalie Cress Will Cascadden Employees Rights to Privacy in the Workplace 2 Federal
More informationThe Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
More informationSMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015
SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory
More information3. Consent for the Collection, Use or Disclosure of Personal Information
PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),
More informationCYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationDiscussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
More informationCOMPLYING WITH THE PERSONAL HEALTH INFORMATION ACT
COMPLYING WITH THE PERSONAL HEALTH INFORMATION ACT The Personal Health Information Act, S.N.S. 2010, c.41 (referred to as PHIA or the Act ) was passed by the Nova Scotia government on December 10, 2010.
More informationPRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
More informationCHBA Briefing Note on Liability in the Residential Building Industry
CHBA Briefing Note on Liability in the Residential Building Industry Introduction Objectives The objective of this report is to present some recent developments in Canada on the topic of liability in the
More information1 Billion Individual records that were hacked in 2014 3.
783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationSTATEMENT OF DELARA DERAKHSHANI CONSUMERS UNION BEFORE THE UNITED STATES SENATE COMMITTEE ON THE JUDICIARY
STATEMENT OF DELARA DERAKHSHANI CONSUMERS UNION BEFORE THE UNITED STATES SENATE COMMITTEE ON THE JUDICIARY ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2013
More informationBRIAN J. BURKE CURRICULUM VITAE. Work involves all aspects of family law. David Eklove Charles Associate. Thorsteinssons LLP, Tax Lawyers Associate
BRIAN J. BURKE CURRICULUM VITAE PROFESSIONAL EXPERIENCE June 2004 present Epstein Cole LLP Partner (2008 to present); Associate (2004 to 2008) Work involves all aspects of family law May 2002 May 2004
More informationCloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationPractice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions
Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions October 2008 Information and Privacy Commissioner of Ontario
More informationCyber Risk in Healthcare AOHC, 3 June 2015
Cyber Risk in Healthcare AOHC, 3 June 2015 Kopiha Nathan, Senior Healthcare Risk Management and Data Specialist James Penafiel, Underwriting Supervisor, Insurance Operations CFPC Conflict of Interest -
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationCo-founder and co-chair of The Advocates Society s Securities Litigation Practice Group 2011-2012
Joel Wiesenfeld Mediator Professional Experience and Education Partner at Torys LLP, 2001-2012 Co-founder and co-chair of The Advocates Society s Securities Litigation Practice Group 2011-2012 Editorial
More informationNews, Events & Publications
News, Events & Publications Kenneth Jull Presentations Panel Member, Canada-China Institute for Business & Development, Chinese Immigrants Doing Business in Canada Conference Program, Ryerson University,
More informationSponsored By: Privacy Issues of Big Data 6.27.2013
Sponsored By: Privacy Issues of Big Data 6.27.2013 1 About Advisen is a privately-owned, independent and unbiased provider of news, data and risk analytics to the commercial insurance industry. Advisen
More informationThe 4 th Annual Commercial Litigation Conference
LexisNexis Conference Series The 4 th Annual Commercial Litigation Conference Recent Developments and Best Practices for the Legal and Accounting Professions Thursday, April 3, 2008 The Grand Hotel Toronto,
More informationCloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
More informationFRONTIER COLLEGE FORUM: LITERACY S IMPACT ON CRIMINAL JUSTICE AND YOUTH
FRONTIER COLLEGE FORUM: LITERACY S IMPACT ON CRIMINAL JUSTICE AND YOUTH A REPORT PREPARED FOR GREAT-WEST LIFE, LONDON LIFE AND CANADA LIFE, MARCH 2014 On February 20, 2014, Frontier College hosted a national
More informationEXECUTIVE DEVELOPMENT
EXECUTIVE DEVELOPMENT ppforum.ca Introduction The Public Policy Forum is Canada s premier convener of multi-sector dialogue. Our central purpose is helping Canadians across the public, private, non-profit
More informationState of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH
State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION Effective August 31, 2007 Publication Name(s): Version #(1): ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES
More informationDATA BREACH POLICY IMPLENTATION GUIDE
DATA BREACH POLICY IMPLENTATION GUIDE OCTOBER 15, 2007 1 Data Breach Policy Implementation Guide Purpose The response to any breach of personally identifiable information (PII) can have a critical impact
More information立 法 會 Legislative Council
立 法 會 Legislative Council LC Paper No. CB(2)2496/11-12 (These minutes have been seen by the Administration) Ref : CB2/PS/4/10 Panel on Transport and Panel on Financial Affairs Joint Subcommittee on Issues
More informationInnovating for quality
Webninar Virtual Event in partnership with Education Fast Forward Monday 7 March Workshops Tuesday 8 March Innovating for quality Symposium Wednesday 9 March Thursday 10 March Provisional Programme 7 11
More informationINFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
More informationWORKSHEETS 20B-IC (08-12)
WORKSHEETS 20B-IC (08-12) Name: Date: IDENTITY CRIME INTRODUCTION Lesson 1-1 Identity crime: Recognize it, report it and stop it Web quest 1: Identity crime: Recognize it, report it and stop it Directions:
More information2015 Combined Chapter Educational Conference
Thursday, September 10, 2015 11:30am 1:00pm Conference Registration, Lunch & Networking Sponsored by Platinum Sponsor: SAP 1:00 1:20pm Welcome & General Business Session Welcome, announcements, introduction
More informationPrivacy Legislation and Industry Security Standards
Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,
More informationLegislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence
Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence December 6, 2012 Michael Greenberger Professor of Law Founder and Director, CHHS Legislative Proposals Maryland
More informationNonprofit risk management
Nonprofit risk management Mary Mancuso Nonprofit organizations face unique risk management challenges. They are often held to the same standards as for-profit organizations but do not have the same resources
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationRemarks on Bill 175, the Ontario Labour Mobility Act by the College of Physicians and Surgeons of Ontario
Remarks on Bill 175, the Ontario Labour Mobility Act by the College of Physicians and Surgeons of Ontario December 3, 2009 (Check against delivery) Thank you for this opportunity to appear before the committee.
More informationCALL FOR PAPERS 2010. Developing an Anti-Ageist Approach to the Law
CALL FOR PAPERS 2010 2010 Canadian Conference on Elder Law October 28-30, 2010 Delta Chelsea Hotel, Toronto, Ontario, Canada In collaboration with the Law Commission of Ontario and the Advocacy Centre
More informationThe potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationLaw Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario
PRIVACY COMPLIANCE ISSUES FOR LAW FIRMS IN ONTARIO By Sara A. Levine 1 Presented at Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario Ontario Bar Association, May 6,
More information