IDENTITY THEFT AND DATA BREACH CONFERENCE 2016

Size: px
Start display at page:

Download "IDENTITY THEFT AND DATA BREACH CONFERENCE 2016"

Transcription

1 IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President - Canadian Identity Theft Prevention Association 9:00am 10:00am Keynote Speaker Privacy and Data Breaches New Legislation and Mandatory Reporting 10:00am 10:15am 10:15am 11:45am Panel 1: Understanding Data Breaches This opening panel will provide attendees with a high level yet comprehensive review of the top strategies being employed by identity criminals, the most up-to-date trends and the wide scope of impacts that data breaches have on both organizations and the public

2 at large. Each speaker will examine data breaches from the following three streams; IT, Policy/Legal, and Victims/Clients. Moderator: Darrell Evans President, Canadian Institute of Information and Privacy Studies and Founder of the BC Freedom of Information and Privacy Association 1. IT Speaker To be announced 2. Policy / Legal Speaker Pippa Lawson - Barrister & Solicitor; Consultant at Philippa Lawson, Barrister & Solicitor. Legal counsel for the Yukon Government 3. Victims / Clients Stream Speaker Dr. Sue Sproule - Assistant Professor - Information Systems Brock University. Co-author of Identity Theft and Fraud: Evaluating and Managing Risk 11:45am 1:00pm Lunch Keynote Dr. Ann Cavoukian Executive Director of the Privacy and Big Data Institute at Ryerson University and former Information and Privacy Commissioner of Ontario. (Appearing via video) 1:00pm 2:30pm Panel 2 Understanding the New Canadian Data Breach Notification Legislation This second panel will focus on the recently legislated Data Protection Act which amends the Personal Information Protection and Electronics Documents Act (PIPEDA) creating new substantial legal requirements and operational procedures for organizations to design and implement. Each panelist will examine the new Canadian data breach legislation from the following three streams; IT, Policy/Legal, and Victims/Clients. Moderator: Tamir Israel, Staff Lawyer - Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Cara-Lynn Stelmack, Director, Mediation and Investigation Team - The Office of the Information and Privacy Commissioner of Alberta 2. Office of the Privacy Commissioner of Canada Staff To be announced

3 2:30pm 3:00pm Special Presentation 3:00pm 3:15pm 3:15pm 4:45pm out Session 1: Preparing For And Preventing A Data Breach These 3 out Sessions will allow conference attendees to focus in on their specific areas of responsibility within the three programmed streams of IT, Public Policy and Victims/Clients. IT out Session Advanced IT and security solutions You're in the privileged position of preparing for and preventing a data breach. What specific steps should you take? In this session, we'll discuss industry best practices with real world solutions. Moderator: Kris Constable, Senior Advisor & Privacy Officer - PrivaSecTech 1. IT Specialist 2. IT Security Specialist Policy and Law out Session Emerging liability framework and standards for data security This breakaway session will explore emerging regulatory, common law and professional obligations and standards for data security in the legal, government and private sectors. Moderator: David Fewer, Executive Director, Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Law Society TBA 2. Government Standards TBA 3. Senior Legal Counsel - TBA

4 Victim / Client out Session Developing strategies to help protect your clients from becoming victims This breakaway session will explore four key strategies to prepare your organization for a data breach with regards to your clients, members and employees from becoming victims. 1st Strategy Engage and educate your clients, members and employees on best practices to ensure they have the necessary knowledge and tools to proactively lockdown their personal information. 2nd Strategy Develop a comprehensive communications and notification strategy for your clients/members and employees to be implemented in the event of a data breach as legislated by the newly enacted Data Privacy Act. 3rd Strategy - Create a crisis communications strategy and incident response plan. 4th Strategy Develop a victim support plan. Moderator: Darrell Evans - President of The Canadian Institute of Information and Privacy Studies and Founder of the BC Freedom of Information and Privacy Association 1. Jim Dorey, Executive Director of the Canadian Identity Theft Support Centre 2. Pippa Lawson - Barrister & Solicitor; Consultant at Philippa Lawson, Barrister & Solicitor. Legal counsel for the Yukon Government 3. Canadian Bankers Association TBA 4:45pm 5:00pm Day Closing Remarks Day 2 - Friday January 29, :30am 9:00am Registration

5 9:00am 9:15am Opening Remarks Conference Chair Kevin M. Scott, President - Canadian Identity Theft Prevention Association 9:15am 10:15am Key Note Minister of Department of Justice or Minister of Industry - TBA 10:15am 10:30am 10:30am 12:00pm Panel 3 - You ve Been Breached, What Now? This final panel will focus on the worst case scenario your organization has suffered a data breach. Upon entering this crisis situation your organization must be positioned to implement a multitude of critical actions in order to mitigate the potential harms to the public, your brand and your bottom line. The speakers on this panel will provide an overview of an overarching strategy that must be deployed at the first sign of a data breach. This high level strategic plan will include IT, legal, public relations and victims strategies. Moderator: Kevin M. Scott, President - Canadian Identity Theft Prevention Association 1. IT Expert TBA 2. Legal Expert - John Russo, Vice President Legal Counsel & Chief Privacy Officer, Equifax Canada 3. Public Relations Expert - Principal, Earnscliffe Strategy Group 12:00 1:30 Lunch - Keynote Speaker TBA 1:30 3:30 out Session 2: All Hands on Deck You ve Been Breached

6 These out Sessions will allow conference attendees to focus in on their specific areas of responsibility within the three programmed streams of IT, Public Policy and Victims/Clients. IT out Session Solutions for an organizational nightmere The dreaded call has come in, you've been breached. If you're not prepared, you won't know who to call or what to do next. It can also be very expensive to resolve and timimg is everything. In this session, you will hear real world experiences, as well as be provided a list of steps, with tips and tricks to minimize the impact and lockdown your organization. The panel will have both the experiences of those who've been breached, and those who have done the breaching. Moderator: Kris Constable, Senior Advisor & Privacy Officer - PrivaSecTech 1. Professional IT Specialist - TBA 2. Renowned Hacker and Security Expert - TBA Policy and Law out Session Security reporting, harm mitigation obligations and blackmail! As 100% security is impossible, you may face a breach regardless of what steps you take. When that occurs, you may face a range of complex issues. Should a discovered security vulnerability be reported? Would doing so cause harm by exposing other systems? Are there any obligations to mitigate potential harm to affected customers or clients and how far might these obligations go? What obligations might arise in extreme situations involving ransomeware or other types of blackmail? Moderator: Tamir Israel, Staff Lawyer - Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Legal Expert TBA 2. Policy Expert TBA 3. Security Specialist - TBA Victim / Client out Session You ve been breached and it time to take immediate action. In this session the speakers will focus on how to design a 72 hour and a follow-up 30- day implementation strategy on how to ensure your organization is able to respond

7 effectively and efficiently to the breach. This will include direct communication with your customers, a crisis communications strategy and a plan reduce the likelihood that your clients will become victims of identity theft. Moderator: Darrell Evans, President of The Canadian Institute of Information and Privacy Studies and Founder, BC Freedom of Information and Privacy Association 1. Tim Ashby - Vice President, Equifax Canada 2. Jim Dorey - Executive Director, Canadian Identity Theft Support Centre 3. Principal - Earnscliffe Strategy Group. Crisis Communications Specialist 3:30pm 3:45pm 3:45pm 4:45pm Plenary Kevin M. Scott, President - Canadian Identity Theft Prevention Association 4:45pm 5:00pm Closing Remarks Kevin Scott President Canadian Identity Theft Prevention Association

Table of Contents. Acknowledgement

Table of Contents. Acknowledgement OPA Communications and Member Services Committee February 2015 Table of Contents Preamble... 3 General Information... 3 Risks of Using Email... 4 Use of Smartphones and Other Mobile Devices... 5 Guidelines...

More information

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 8 focused webinars for the latest legal developments, including: Session 1: September 16,

More information

Responding to Data Breaches. March 25, 2015

Responding to Data Breaches. March 25, 2015 Better breach response how to be good when things go bad Ian Dick Dan Michaluk Better breach response The Rules of Professional Conduct The basis for good breach response Incident response planning Notification,

More information

Identity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota

Identity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota 1 Identity Theft Regulation *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota (605) 455-6110 csarmiento@olc.edu Introduction This

More information

INDUSTRY GUIDE TO FINANCIAL PLANNING WEEK

INDUSTRY GUIDE TO FINANCIAL PLANNING WEEK INDUSTRY GUIDE TO FINANCIAL PLANNING WEEK Tips, Tools & Opportunities to Help Your Organization Make the Most of Financial Planning Week FINANCIAL PLANNING WEEK provides a significant opportunity for your

More information

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy. Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure

More information

Bill S-4, An Act to amend the Personal Information Protection and Electronic Documents Act and to make a consequential amendment to another Act

Bill S-4, An Act to amend the Personal Information Protection and Electronic Documents Act and to make a consequential amendment to another Act 2 Carlton Street, Suite 701 Toronto, Ontario M5B 1J3 Tel: (416) 598-2656 Fax: (416) 598-7924 www.acelaw.ca Chair, Board of Directors Lyndsay O Callaghan Lawyers Judith A. Wahl, B.A., LL.B. Rita A. Chrolavicius,

More information

Issue #5 July 9, 2015

Issue #5 July 9, 2015 Issue #5 July 9, 2015 Breach Response Plans by Lyndsay A. Wasser, CIPP/C, Co-Chair Privacy Privacy breaches can occur despite an organization s best efforts to prevent them. When such incidents arise,

More information

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring

More information

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing

More information

Individuals affected by the breach How many individuals are affected by the breach? Who was affected by the breach: employees, public, contractors, clients, service providers, other organizations? Foreseeable

More information

Personal Information Protection Act Information Sheet 11

Personal Information Protection Act Information Sheet 11 Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores

More information

ID Fraud & Law Reform

ID Fraud & Law Reform ID Fraud & Law Reform Philippa Lawson, Director Canadian Internet Policy and Public Interest Clinic University of Ottawa, Faculty of Law www.cippic.ca BC FIPA Privacy and ID Theft Conference Vancouver,

More information

CYBER LIABILITY CLAIMS

CYBER LIABILITY CLAIMS CYBER LIABILITY CLAIMS TRENDS AND DEVELOPMENTS IN THE U.S. AND CANADA Animateur / Moderator: Daniel Desjardins, Senior Director Global Risk Management & Insurance, Bombardier Inc. Conférenciers / Speakers:

More information

The Manitoba Child Care Association PRIVACY POLICY

The Manitoba Child Care Association PRIVACY POLICY The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information

More information

Big Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi

Big Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Big Data, Big Risk? Data Management and Privacy Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Data Management & Privacy Compliance Heather Innes Chief Privacy Officer, General Motors

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

INVESTIGATION REPORT 173-2015

INVESTIGATION REPORT 173-2015 Saskatchewan Government Insurance November 12, 2015 Summary: Saskatchewan Government Insurance (SGI) proactively reported to the Office of the Information and Privacy Commissioner (OIPC) that it had received

More information

Privacy Law in Canada

Privacy Law in Canada Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the

More information

Anatomy of a Privacy and Data Breach

Anatomy of a Privacy and Data Breach Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

erisks Policyholder s Guide to Privacy & Security Breach Response Planning

erisks Policyholder s Guide to Privacy & Security Breach Response Planning erisks Policyholder s Guide to Privacy & Security Breach Response Planning Professional Indemnity Financial Institutions Directors & Officers Management Liability Medical Malpractice Media Liability Level

More information

Charities and Not-for-Profit Law Conference 2009 Learn how to protect, strengthen, and guide your organization!

Charities and Not-for-Profit Law Conference 2009 Learn how to protect, strengthen, and guide your organization! Charities and Not-for-Profit Law Conference 2009 Learn how to protect, strengthen, and guide your organization! Friday, February 13, 2009 There are three learning options for this course: 1. a face-to-face

More information

Procedure for Managing a Privacy Breach

Procedure for Managing a Privacy Breach Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Privacy Breach Protocol

Privacy Breach Protocol & Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the

More information

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section

More information

28 th Annual Clinical Negligence Conference

28 th Annual Clinical Negligence Conference SPONSORSHIP & EXHIBITION OPPORTUNITIES at the event for clinical negligence specialists 28 th Annual Clinical Negligence Conference 1 st 2 nd July 2016, Hilton Brighton Metropole Action against Medical

More information

Victimization by Credit Card Fraud and Identity Theft in Kentucky 2008

Victimization by Credit Card Fraud and Identity Theft in Kentucky 2008 Victimization by Credit Card Fraud and Identity Theft in Kentucky 2008 Dr. David May Emily Raine Eastern Kentucky University Acknowledgement The data used in this presentation were collected as part of

More information

Helping to protect your business and your customers in the event of a data breach

Helping to protect your business and your customers in the event of a data breach Helping to protect your business and your customers in the event of a data breach Equifax Data Breach Assistance helps you respond more quickly and effectively, limiting the reputational damage to your

More information

Cyber Liability Insurance:

Cyber Liability Insurance: Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major

More information

Online Privacy: Make Youth Awareness and Education a Priority

Online Privacy: Make Youth Awareness and Education a Priority Online Privacy: Make Youth Awareness and Education a Priority Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada For young people today, going online to connect and interact with

More information

Privacy Law in Canada

Privacy Law in Canada by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually

More information

Taking care of what s important to you

Taking care of what s important to you A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten

More information

Office of the Information and Privacy Commissioner Province of British Columbia Order No. 16-1994 July 8, 1994

Office of the Information and Privacy Commissioner Province of British Columbia Order No. 16-1994 July 8, 1994 Office of the Information and Privacy Commissioner Province of British Columbia Order No. 16-1994 July 8, 1994 INQUIRY RE: A Request for Access to Records of the Insurance Corporation of British Columbia

More information

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security 2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security Commissioned by ID Experts November 2009 INTRODUCTION Healthcare breaches are on the rise; according to the 2009

More information

Directory of Records. Workers Compensation Board Alberta

Directory of Records. Workers Compensation Board Alberta Directory of Records Workers Compensation Board Alberta Last updated: May 2005 Table of Contents WCB Mandate...3 Organization...3 Introduction...4 How the Directory is Organized...4 Access Point...4 Business

More information

Helpful Tips. Privacy Breach Guidelines. September 2010

Helpful Tips. Privacy Breach Guidelines. September 2010 Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information

More information

Cyber Risk and the Utility Industry

Cyber Risk and the Utility Industry Cyber Risk and the Utility Industry Imran Ahmad Lawyer, Cassels Brock & Blackwell LLP Canadian Legal Landscape Personal Information Protection and Electronic Documents Act (PIPEDA) Federal legislation

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Data Breach Readiness

Data Breach Readiness Data Breach Readiness 877.983.9850 Partner@Intersections.com www.intersections.com Introduction Few events can damage a company s reputation more than losing the personal confidential information entrusted

More information

NOT-FOR-PROFIT FINANCE LEADERSHIP DAY THURSDAY, NOVEMBER 12, 2015 CHELSEA HOTEL, TORONTO FINANCE AND STRATEGY

NOT-FOR-PROFIT FINANCE LEADERSHIP DAY THURSDAY, NOVEMBER 12, 2015 CHELSEA HOTEL, TORONTO FINANCE AND STRATEGY NOT-FOR-PROFIT FINANCE LEADERSHIP DAY THURSDAY, NOVEMBER 12, 2015 CHELSEA HOTEL, TORONTO FINANCE AND STRATEGY For Professionals. By Professionals. Your Pathway To Success. CPA Ontario s Not-for-Profit

More information

Privacy by Design Setting a new standard for privacy certification

Privacy by Design Setting a new standard for privacy certification Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,

More information

Online privacy and identity A regulatory body s perspective

Online privacy and identity A regulatory body s perspective Online privacy and identity A regulatory body s perspective April 21, 2008, Montreal, QC Internet Use and the Norm o $50 million in sales to Canadians o 10 million Canadians use social networking sites

More information

CURRICULUM VITAE. Telephone: 416-366-3811 E -Mail: TBW@ToddWhiteLaw.Com. TODD WHITE is a senior Toronto criminal lawyer.

CURRICULUM VITAE. Telephone: 416-366-3811 E -Mail: TBW@ToddWhiteLaw.Com. TODD WHITE is a senior Toronto criminal lawyer. CURRICULUM VITAE TODD BRETT WHITE, B.A. (Hons), LL.B. Barrister Canada Life Building 330 University Avenue Fifth Floor Toronto, Ontario, Canada M5G 1R7 Telephone: 416-366-3811 E -Mail: TBW@ToddWhiteLaw.Com

More information

Real Estate Council of Alberta. An introduction 1

Real Estate Council of Alberta. An introduction 1 Real Estate Council of Alberta An introduction 1 2 Real Estate Council of Alberta - An introduction Welcome At the heart of Alberta s real estate industry is an organization where people work cooperatively

More information

CARIBBEAN SOCIAL MEDIA MARKETING SUMMIT 2015

CARIBBEAN SOCIAL MEDIA MARKETING SUMMIT 2015 ASSOCIATION OF CARIBBEAN CORPORATE COUNSEL ( ACCC ) PRESENTS ITS CARIBBEAN SOCIAL MEDIA MARKETING SUMMIT 2015 24 TH JULY 2015 Courtyard Marriott, Port of Spain, Trinidad 7:45AM - 8:45AM REGISTRATION CHECK

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

David A. Bertschi Partner

David A. Bertschi Partner Call to the Bar: Ontario 1985 Languages: English French Education LL.B., University of Windsor, Windsor, Ontario (1983) B.A., Carleton University, Ottawa, Ontario (1980) Areas of Practice Insurance litigation

More information

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft Canadian Internet Policy and Public Interest Clinic Clinique d intérêt public et de politique d internet du Canada Brief to the House of Commons Standing Committee on Access to Information, Privacy and

More information

D EBORAH C. A NSCHELL

D EBORAH C. A NSCHELL D EBORAH C. A NSCHELL 128 Ledbury St. Toronto, ON M5M 4H9 Res: 416.322.8066 e-mail: deborah@anschell.com BAR ADMISSIONS Admitted to the Law Society of British Columbia on August 27, 1993 Admitted to the

More information

REDEFINING THE BOUNDARIES OF RISK MANAGEMENT, NOW AND INTO THE FUTURE

REDEFINING THE BOUNDARIES OF RISK MANAGEMENT, NOW AND INTO THE FUTURE CYBER RISKS SECURITY BREACH CHECKLIST REDEFINING THE BOUNDARIES OF RISK MANAGEMENT, NOW AND INTO THE FUTURE STEP 1 UNDERTAKE PRELIMINARY ASSESSMENT OF THE INCIDENT A serious data security breach is described

More information

CURRICULUM VITAE. BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada)

CURRICULUM VITAE. BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada) CURRICULUM VITAE BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada) HELLER, RUBEL Barristers 120 Adelaide Street West Suite 1902 Toronto, Ontario M5H 1T1 business:

More information

Preliminary Agenda As of Friday, April 15, 2016

Preliminary Agenda As of Friday, April 15, 2016 Preliminary Agenda As of Friday, April 15, 2016 Monday, April 25 2:00pm 6:30pm 2:00pm 2:45pm Registration 101 Overview Sessions Join IRI, DTCC and ACORD for an update on today s industry workgroups and

More information

A Year in Review: CIHI s 2013 2014 Annual Privacy Report

A Year in Review: CIHI s 2013 2014 Annual Privacy Report A Year in Review: CIHI s 2013 2014 Annual Privacy Report Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated

More information

Cloud Computing: Privacy and Other Risks

Cloud Computing: Privacy and Other Risks December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Title. Key Issues in Privacy and Information Management Webinar Series - Session 7: Big Data: Current and Emerging Privacy Issues 1.25 0.

Title. Key Issues in Privacy and Information Management Webinar Series - Session 7: Big Data: Current and Emerging Privacy Issues 1.25 0. LSUC (ON) CPD 2014 ***For information regarding CPD/MCLE Hours for past OsgoodePD Programs for other Canadian jurisdictions or the NY Bar, please contact cpd@osgoode.yorku.ca Date Title Substantive (Hours)

More information

Put your Head in the Cloud at Phorum

Put your Head in the Cloud at Phorum Put your Head in the Cloud at Phorum There is no question that cloud computing and cloud strategies are at the forefront of many business leaders minds and budgets. CxOs have their heads in the clouds,

More information

Privacy in the Workplace Update What You Don t Know May Hurt You

Privacy in the Workplace Update What You Don t Know May Hurt You McCarthy Tétrault Advance Building Capabilities for Growth Privacy in the Workplace Update What You Don t Know May Hurt You Rosalie Cress Will Cascadden Employees Rights to Privacy in the Workplace 2 Federal

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

3. Consent for the Collection, Use or Disclosure of Personal Information

3. Consent for the Collection, Use or Disclosure of Personal Information PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

COMPLYING WITH THE PERSONAL HEALTH INFORMATION ACT

COMPLYING WITH THE PERSONAL HEALTH INFORMATION ACT COMPLYING WITH THE PERSONAL HEALTH INFORMATION ACT The Personal Health Information Act, S.N.S. 2010, c.41 (referred to as PHIA or the Act ) was passed by the Nova Scotia government on December 10, 2010.

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department

More information

CHBA Briefing Note on Liability in the Residential Building Industry

CHBA Briefing Note on Liability in the Residential Building Industry CHBA Briefing Note on Liability in the Residential Building Industry Introduction Objectives The objective of this report is to present some recent developments in Canada on the topic of liability in the

More information

1 Billion Individual records that were hacked in 2014 3.

1 Billion Individual records that were hacked in 2014 3. 783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

STATEMENT OF DELARA DERAKHSHANI CONSUMERS UNION BEFORE THE UNITED STATES SENATE COMMITTEE ON THE JUDICIARY

STATEMENT OF DELARA DERAKHSHANI CONSUMERS UNION BEFORE THE UNITED STATES SENATE COMMITTEE ON THE JUDICIARY STATEMENT OF DELARA DERAKHSHANI CONSUMERS UNION BEFORE THE UNITED STATES SENATE COMMITTEE ON THE JUDICIARY ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2013

More information

BRIAN J. BURKE CURRICULUM VITAE. Work involves all aspects of family law. David Eklove Charles Associate. Thorsteinssons LLP, Tax Lawyers Associate

BRIAN J. BURKE CURRICULUM VITAE. Work involves all aspects of family law. David Eklove Charles Associate. Thorsteinssons LLP, Tax Lawyers Associate BRIAN J. BURKE CURRICULUM VITAE PROFESSIONAL EXPERIENCE June 2004 present Epstein Cole LLP Partner (2008 to present); Associate (2004 to 2008) Work involves all aspects of family law May 2002 May 2004

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions

Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions October 2008 Information and Privacy Commissioner of Ontario

More information

Cyber Risk in Healthcare AOHC, 3 June 2015

Cyber Risk in Healthcare AOHC, 3 June 2015 Cyber Risk in Healthcare AOHC, 3 June 2015 Kopiha Nathan, Senior Healthcare Risk Management and Data Specialist James Penafiel, Underwriting Supervisor, Insurance Operations CFPC Conflict of Interest -

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Co-founder and co-chair of The Advocates Society s Securities Litigation Practice Group 2011-2012

Co-founder and co-chair of The Advocates Society s Securities Litigation Practice Group 2011-2012 Joel Wiesenfeld Mediator Professional Experience and Education Partner at Torys LLP, 2001-2012 Co-founder and co-chair of The Advocates Society s Securities Litigation Practice Group 2011-2012 Editorial

More information

News, Events & Publications

News, Events & Publications News, Events & Publications Kenneth Jull Presentations Panel Member, Canada-China Institute for Business & Development, Chinese Immigrants Doing Business in Canada Conference Program, Ryerson University,

More information

Sponsored By: Privacy Issues of Big Data 6.27.2013

Sponsored By: Privacy Issues of Big Data 6.27.2013 Sponsored By: Privacy Issues of Big Data 6.27.2013 1 About Advisen is a privately-owned, independent and unbiased provider of news, data and risk analytics to the commercial insurance industry. Advisen

More information

The 4 th Annual Commercial Litigation Conference

The 4 th Annual Commercial Litigation Conference LexisNexis Conference Series The 4 th Annual Commercial Litigation Conference Recent Developments and Best Practices for the Legal and Accounting Professions Thursday, April 3, 2008 The Grand Hotel Toronto,

More information

Cloud Computing Contract Clauses

Cloud Computing Contract Clauses Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security

More information

FRONTIER COLLEGE FORUM: LITERACY S IMPACT ON CRIMINAL JUSTICE AND YOUTH

FRONTIER COLLEGE FORUM: LITERACY S IMPACT ON CRIMINAL JUSTICE AND YOUTH FRONTIER COLLEGE FORUM: LITERACY S IMPACT ON CRIMINAL JUSTICE AND YOUTH A REPORT PREPARED FOR GREAT-WEST LIFE, LONDON LIFE AND CANADA LIFE, MARCH 2014 On February 20, 2014, Frontier College hosted a national

More information

EXECUTIVE DEVELOPMENT

EXECUTIVE DEVELOPMENT EXECUTIVE DEVELOPMENT ppforum.ca Introduction The Public Policy Forum is Canada s premier convener of multi-sector dialogue. Our central purpose is helping Canadians across the public, private, non-profit

More information

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION Effective August 31, 2007 Publication Name(s): Version #(1): ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES

More information

DATA BREACH POLICY IMPLENTATION GUIDE

DATA BREACH POLICY IMPLENTATION GUIDE DATA BREACH POLICY IMPLENTATION GUIDE OCTOBER 15, 2007 1 Data Breach Policy Implementation Guide Purpose The response to any breach of personally identifiable information (PII) can have a critical impact

More information

立 法 會 Legislative Council

立 法 會 Legislative Council 立 法 會 Legislative Council LC Paper No. CB(2)2496/11-12 (These minutes have been seen by the Administration) Ref : CB2/PS/4/10 Panel on Transport and Panel on Financial Affairs Joint Subcommittee on Issues

More information

Innovating for quality

Innovating for quality Webninar Virtual Event in partnership with Education Fast Forward Monday 7 March Workshops Tuesday 8 March Innovating for quality Symposium Wednesday 9 March Thursday 10 March Provisional Programme 7 11

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

WORKSHEETS 20B-IC (08-12)

WORKSHEETS 20B-IC (08-12) WORKSHEETS 20B-IC (08-12) Name: Date: IDENTITY CRIME INTRODUCTION Lesson 1-1 Identity crime: Recognize it, report it and stop it Web quest 1: Identity crime: Recognize it, report it and stop it Directions:

More information

2015 Combined Chapter Educational Conference

2015 Combined Chapter Educational Conference Thursday, September 10, 2015 11:30am 1:00pm Conference Registration, Lunch & Networking Sponsored by Platinum Sponsor: SAP 1:00 1:20pm Welcome & General Business Session Welcome, announcements, introduction

More information

Privacy Legislation and Industry Security Standards

Privacy Legislation and Industry Security Standards Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,

More information

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence December 6, 2012 Michael Greenberger Professor of Law Founder and Director, CHHS Legislative Proposals Maryland

More information

Nonprofit risk management

Nonprofit risk management Nonprofit risk management Mary Mancuso Nonprofit organizations face unique risk management challenges. They are often held to the same standards as for-profit organizations but do not have the same resources

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

Remarks on Bill 175, the Ontario Labour Mobility Act by the College of Physicians and Surgeons of Ontario

Remarks on Bill 175, the Ontario Labour Mobility Act by the College of Physicians and Surgeons of Ontario Remarks on Bill 175, the Ontario Labour Mobility Act by the College of Physicians and Surgeons of Ontario December 3, 2009 (Check against delivery) Thank you for this opportunity to appear before the committee.

More information

CALL FOR PAPERS 2010. Developing an Anti-Ageist Approach to the Law

CALL FOR PAPERS 2010. Developing an Anti-Ageist Approach to the Law CALL FOR PAPERS 2010 2010 Canadian Conference on Elder Law October 28-30, 2010 Delta Chelsea Hotel, Toronto, Ontario, Canada In collaboration with the Law Commission of Ontario and the Advocacy Centre

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario

Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario PRIVACY COMPLIANCE ISSUES FOR LAW FIRMS IN ONTARIO By Sara A. Levine 1 Presented at Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario Ontario Bar Association, May 6,

More information