Mastering Data Privacy, Protection, & Forensics Law
|
|
- Brice Goodwin
- 8 years ago
- Views:
Transcription
1 Mastering Data Privacy, Protection, & Forensics Law April 15, 2015 Data Breach Notification and Cybersecurity Developments in 2015 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy Professional/US This presentation was created by Dorsey & Whitney LLP, 50 South Sixth Street, Suite 1500, Minneapolis, MN This presentation is intended for general information purposes only and should not be construed as legal advice or legal opinions on any specific facts or circumstances. An attorney-client relationship is not created or continued by sending and/or receiving this presentation. Members of Dorsey & Whitney will be pleased to provide further information regarding the matters discussed in this presentation. 1
2 2015 state data breach notification requirements 18 state laws, plus Puerto Rico law, also require notification of a breach to a state attorney general or regulator in addition to the affected individuals Effective October 1, 2015: 19 state laws with the addition of Montana California and Florida laws define personal information as covering online account information Effective July 1, 2015: 3 state laws with the addition of Wyoming 2
3 Cybersecurity laws and guidance and provisions in contracts and policies Issued in January 2015: Federal: Federal Trade Commission Staff Report on Internet of Things 3
4 Resources (continued) Cybersecurity (continued) Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Regulation-mar-2015.pdf Guidance for Managing Cybersecurity Risks National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Cybersecurity in the Golden State 4
5 Resources (continued) Boards of Directors and Corporate Governance Board Oversight of Cyberrisks: Directors and Officers Litigation cyber-privacy-risk-insurance.aspx Boards of Directors, Corporate Governance and Cyber- Risks: Sharpening the Focus #.VDvmOa1OXct National Association of Corporate Directors 2014 Cyber- Risk Oversight Handbook 5
6 Questions & Answers Melissa J. Krasnow (612)
7 Mastering Data Privacy, Social Media, & Cyber Law October 22, 2014 Data Breach Notification and Cybersecurity Developments in 2014 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy Professional/US 1
8 State breach notification laws 47 states, plus the District of Columbia, Guam, Puerto Rico and Virgin Islands, have breach notification laws (Alabama, New Mexico, and South Dakota do not have these laws) These laws require notification of a breach to affected individuals These laws cover breaches involving personal information in electronic format 2
9 2014 state breach notification law developments 18 state laws, plus Puerto Rico law, also require notification of a breach to a state attorney general or regulator in addition to the affected individuals 7 state laws cover breaches involving personal information in both electronic and paper formats California and Florida laws define personal information as covering online account information New Kentucky breach notification law 3
10 California breach notification law amendment effective January 1, 2015 Where a person or business was the source of a breach, the person or business providing breach notification must offer to provide appropriate identity theft prevention and mitigation services, if any, at no cost to an affected individual for not less than 12 months, along with all information necessary to take advantage of the offer to any person whose information was or may have been breached if the breach exposed or may have exposed his or her first name or first initial and last name, together with any of the following data elements, where the name or the data elements are not encrypted: SSN Driver's license number or California identification card number 4
11 Breach notification in federal and foreign laws and provisions in contracts and policies Federal HIPAA / HITECH Act breach notification for covered entities and business associates regarding protected health information Laws in other countries (e.g., Canada) Provisions in contracts and policies 5
12 Cybersecurity laws and guidance and provisions in contracts and policies State security procedures laws: Massachusetts and certain other states (e.g., California) Issued in February 2014: Federal: National Institute of Standards and Technology critical infrastructure cybersecurity framework California cybersecurity guidance Provisions in contracts and policies 6
13 Cyber liability insurance Main coverages in a traditional cyber liability insurance policy include: Security and privacy liability insurance that responds to third party liability Event management insurance that responds by paying costs for breach notification, public relations and other services to assist in managing a covered privacy or network security incident Cyber extortion insurance that pays to settle network securityrelated extortion demands made against the insured Network business interruption insurance that responds to an insured s loss of income and operating expenses when business operations are interrupted or suspended due to a failure of network security 7
14 Enforcement, litigation and other consequences Federal Trade Commission Department of Health and Human Services State attorneys general (e.g., California and Massachusetts) Foreign regulators Litigation Other consequences 8
15 Some steps companies are taking to prepare Preparing, revising and testing incident response plans Tabletop Exercise (TTX) A TTX is intended to generate discussion of various issues regarding a hypothetical, simulated emergency. TTXs can be used to enhance general awareness, validate plans and procedures, rehearse concepts, and/or assess the types of systems needed to guide the prevention of, protection from, mitigation of, response to, and recovery from a defined incident. Generally, TTXs are aimed at facilitating conceptual understanding, identifying strengths and areas for improvement, and/or achieving changes in perceptions. Source: Homeland Security Exercise and Evaluation Program (HSEEP) (April 2013) 9
16 Some steps companies are taking to prepare (continued) Preparing and revising company policies and programs, including training Procuring security and data breach services Considering or reviewing cyber liability insurance 10
17 Resources Data breach California Privacy Laws Change: Identity Theft Prevention and Mitigation Services Changes in State Breach Notification Laws California s Breach Notification Law Expands to Include Online Account Information Verizon 2014 Data Breach Investigations Report Cybersecurity Cybersecurity White Paper 11
18 Resources (continued) Cybersecurity (continued) Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation ms%20compliance%20with%20the%20massachusetts%20% %29.pdf Guidance for Managing Cybersecurity Risks National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Cybersecurity in the Golden State Boards of Directors, Corporate Governance and Cyber-Risks: Sharpening the Focus National Association of Corporate Directors 2014 Cyber-Risk Oversight Handbook 12
19 Questions & Answers Melissa J. Krasnow
Mastering Data Privacy, Social Media, & Cyber Law
Mastering Data Privacy, Social Media, & Cyber Law October 22, 2014 Data Breach Notification and Cybersecurity Developments in 2014 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy
More informationThe Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide
The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide Practising Law Institute January 9, 2012 Melissa J. Krasnow, Partner, Dorsey & Whitney LLP, and Certified Information Privacy Professional
More informationUpdates within Network Security and Privacy Risk Management
Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy,
More informationCyber and Privacy Risk What Are the Trends? Is Insurance the Answer?
Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information
More informationChex Systems, Inc. does not currently charge a fee to place, lift or remove a freeze; however, we reserve the right to apply the following fees:
Chex Systems, Inc. does not currently charge a fee to place, lift or remove a freeze; however, we reserve the right to apply the following fees: Security Freeze Table AA, AP and AE Military addresses*
More informationData Breach 101 How to Avoid a Virtual Catastrophe
Data Breach 101 How to Avoid a Virtual Catastrophe Presented by Eduard Goodman, J.D., LL.M., CIPP Chief Privacy Officer In partnership with IDentity Theft 911 is solely responsible for the content of this
More informationAuditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP
Auditing your institution's cybersecurity incident/breach response plan Objectives > Provide an overview of incident/breach response plans and their intended benefits > Describe regulatory/legal requirements
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
More informationDisaster Design: How to Develop and Conduct an Effective Tabletop Exercise
Community College Risk Management Consortium July 23 24, 2015 Disaster Design: How to Develop and Conduct an Effective Tabletop Exercise JEFF COPELAND JULY 2015 Disaster by Design How to develop and conduct
More informationHealth Care Data Breach Discovery Strategies for Immediate Response
Health Care Data Breach Discovery Strategies for Immediate Response March 27, 2014 Pillsbury Winthrop Shaw Pittman LLP Faculty Gerry Hinkley Partner Pillsbury Winthrop Shaw Pittman LLP Sarah Flanagan Partner
More informationData Privacy & Security: Essential Questions Every Business Must Ask
Data Privacy & Security: Essential Questions Every Business Must Ask Presented by: Riddell Williams P.S. Riddell Williams P.S. May 6, 2015 #4841-4703-9779 Innocent? 2 Overview 3 basic questions every business
More informationData Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com
Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker cbrubaker@clarkhill.com November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute
More information2014 INCOME EARNED BY STATE INFORMATION
BY STATE INFORMATION This information is being provided to assist in your 2014 tax preparations. The information is also mailed to applicable Columbia fund non-corporate shareholders with their year-end
More informationSECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS. The Board of Governors of the Federal Reserve System (Board), the Federal Deposit
SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS The Board of Governors of the Federal Reserve System (Board), the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
More informationThe Obama Administration and Community Health Centers
The Obama Administration and Community Health Centers Community health centers are a critical source of health care for millions of Americans particularly those in underserved communities. Thanks primarily
More informationSECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS. or branches outside of its home state primarily for the purpose of deposit production.
SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS The Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, and the Office of the Comptroller of the Currency (the agencies)
More informationIntroduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com
More informationClients Legal Needs in HIPAA Security Compliance
Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance
More informationPrivacy Legislation and Industry Security Standards
Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,
More informationExhibit 57A. Approved Attorney Fees and Title Expenses
Exhibit 57A Approved Attorney Fees and Title Expenses Written pre-approval from Freddie Mac is required before incurring any expense in excess of any of the below amounts. See Sections 71.19 and 71.24
More informationUnited States Department of Justice Executive Office for United States Trustees. Public Report:
United States Department of Justice Executive Office for United States Trustees Public Report: Debtor Audits by the United States Trustee Program Fiscal Year 2014 (As required by Section 603(a)(2)(D) of
More informationReal Progress in Food Code Adoption
Real Progress in Food Code Adoption The Association of Food and Drug Officials (AFDO), under contract to the Food and Drug Administration, is gathering data on the progress of FDA Food Code adoptions by
More informationModel Regulation Service July 2005 LIFE INSURANCE MULTIPLE POLICY MODEL REGULATION
Table of Contents Section 1. Section 2. Section 3. Section 4. Section 5. Section 6. Section 1. Model Regulation Service July 2005 Purpose Authority Exemptions Duties of Insurers Severability Effective
More information(In effect as of January 1, 2004*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES FECA LHWCA
(In effect as of January 1, 2004*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES Full Medical Benefits** Alabama Indiana Nebraska South Carolina Alaska Iowa Nevada South Dakota
More informationExecutive Summary. Introduction
Written Testimony of Ravi Pendse, Ph.D. Vice President and Chief Information Officer Brown University Cisco Fellow Professor of Practice, Computer Science and Engineering Before the U.S. Senate Committee
More informationIntercountry Adoptions Finalized Abroad
State Statutes Series Current Through July 2005 Adoptions Finalized Abroad adoptions may be finalized abroad or domestically. Most State statutes give full effect and recognition to intercountry adoptions
More informationNOTICE OF PROTECTION PROVIDED BY [STATE] LIFE AND HEALTH INSURANCE GUARANTY ASSOCIATION
NOTICE OF PROTECTION PROVIDED BY This notice provides a brief summary of the [STATE] Life and Health Insurance Guaranty Association (the Association) and the protection it provides for policyholders. This
More informationHomeland Insurance Company of New York Homeland Insurance Company of Delaware (Stock companies owned by the OneBeacon Insurance Group)
Homeland Insurance Company of New York Homeland Insurance Company of Delaware (Stock companies owned by the OneBeacon Insurance Group) NETWORK SECURITY AND PRIVACY LIABILITY RENEWAL APPLICATION PORTIONS
More informationData Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
More informationData Security Best Practices for In-House Counsel
Donna L. Wilson, Linda D. Kornfeld and Rebecca Perry Association of Corporate Counsel San Diego August 6, 2015 1 DONNA L. WILSON Tel: (310) 312-4144 Email: DLWilson@manatt.com Donna L. Wilson is co-chair
More informationPrepared by : Michael R. Fowlkes CBP / Fraudulent Document Officer San Ysidro Port of Entry 720 E. San Ysidro Blvd. San Ysidro, CA 92173 (619)
Prepared by : Michael R. Fowlkes CBP / Fraudulent Document Officer San Ysidro Port of Entry 720 E. San Ysidro Blvd. San Ysidro, CA 92173 (619) 662-7342 Social Security Facts: The Social Security act was
More informationInsulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015
Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery
More information12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
More informationFull Medical Benefits**
(In effect as of January 1, 2006*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES Full Medical Benefits** Alabama Indiana Nebraska South Carolina Alaska Iowa Nevada South Dakota
More informationA/B MAC Jurisdiction 1 Original Medicare Claims Processor
A/B MAC Jurisdiction 1 Jurisdiction 1 - American Samoa, California, Guam, Hawaii, Nevada and Northern Mariana Islands Total Number of Fee-For-Service Beneficiaries: 3,141,183 (as of Total Number of Beneficiaries
More informationModel Regulation Service January 2006 DISCLOSURE FOR SMALL FACE AMOUNT LIFE INSURANCE POLICIES MODEL ACT
Table of Contents Section 1. Section 2. Section 3. Section 4. Section 5. Section 6. Section 1. Model Regulation Service January 2006 Purpose Definition Exemptions Disclosure Requirements Insurer Duties
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
More informationUpdates on HITECH and State Breach Notification and Security Requirements Robin Campbell
Who s Afraid Of A Big Bad Breach?: Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell Overview Identifying the laws that protect personal information and protected
More informationSchedule B DS1 & DS3 Service
Schedule B DS1 & DS3 Service SCHEDULE B Private Line Data Services DS1 & DS3 Service... 2 DS-1 Local Access Channel... 2 DS-1 Local Access Channel, New Jersey... 2 DS-1 Local Access Channel, Out-of-State...
More informationCyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
More informationLicensure Resources by State
Licensure Resources by State Alabama Alabama State Board of Social Work Examiners http://socialwork.alabama.gov/ Alaska Alaska Board of Social Work Examiners http://commerce.state.ak.us/dnn/cbpl/professionallicensing/socialworkexaminers.as
More informationApplication for Automatic Extension of Time To File U.S. Individual Income Tax Return
Form 4868 Department of the Treasury Internal Revenue Service (99) Application for Automatic Extension of Time To File U.S. Individual Income Tax Return Information about Form 4868 and its instructions
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationOPT Extension Application Process 11/22/2010
OPT Extension Application Process 11/22/2010 Step One: Request an I-20 recommending OPT Extension from Designated School Officer (DSO) (Pi-Shin pishin@npu.edu or Bill wjw@npu.edu or Jessie jessie@npu.edu)
More informationCSU INFORMATION SECURITY. Presentation for 2012 CSU Auxiliary Conference January 11, 2012
CSU INFORMATION SECURITY Presentation for 2012 CSU Auxiliary Conference January 11, 2012 Agenda Governance, Risk, and Compliance (GRC) Project Virtual Information Security Service Center (VISC) Compliance
More informationJefferson Glassie, FASAE Whiteford, Taylor & Preston
Jefferson Glassie, FASAE Whiteford, Taylor & Preston 2 * 3 PII = An individuals first name and last name or first initial and last name in combination with any one or more of the following data elements
More informationData Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1
Data Breach Response Basic Principles Under U.S. State and Federal Law ABA Litigation Section Core Knowledge January 2015 1 I. Introduction Data breaches have become an unfortunate reality for many of
More informationState Pest Control/Pesticide Application Laws & Regulations. As Compiled by NPMA, as of December 2011
State Pest Control/Pesticide Application Laws & As Compiled by NPMA, as of December 2011 Alabama http://alabamaadministrativecode.state.al.us/docs/agr/mcword10agr9.pdf Alabama Pest Control Alaska http://dec.alaska.gov/commish/regulations/pdfs/18%20aac%2090.pdf
More informationLLC Member/Manager Disclosure Question by: Cathy Beaudoin. Jurisdiction. Date: 01 March 2011. LLC Member/Manager Disclosure 2011 March 01
Topic: LLC Member/Manager Disclosure Question by: Cathy Beaudoin : Maine Date: 01 March 2011 Manitoba Corporations Canada Alabama Alaska Arizona Arkansas California Our statement of information (aka annual
More informationWho May Adopt, Be Adopted, or Place a Child for Adoption?
State Statutes Series Current Through February 2006 Who May Adopt, Be Adopted, or Place a Child for Adoption? In order for an adoption to take place, a person available to be adopted must be placed in
More informationT H E R E A L C O S T O F A D ATA B R E A C H
T H E R E A L C O S T O F A D ATA B R E A C H Hosted by AllClear ID www.allclearid.com/business WELCOME // QUICK NOTES Presentation is being recorded and will be available within 2-3 business days at www.allclearid.com/business
More informationImpacts of Sequestration on the States
Impacts of Sequestration on the States Alabama Alabama will lose about $230,000 in Justice Assistance Grants that support law STOP Violence Against Women Program: Alabama could lose up to $102,000 in funds
More informationTHE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK
THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK SECURITY AND THEFT OF DATA COVERAGE APPLICATION Name of Insurance Company to which application is made NOTICE: THIS POLICY PROVIDES CLAIMS MADE COVERAGE.
More informationBest practices and insight to protect your firm today against tomorrow s cybersecurity breach
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently
More informationThe Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
More informationBroadband Availability in America. With Rural Americans Looking for High-Speed Services, Adequate Broadband Speeds Remain Out of Reach for Many
Broadband Availability in America With Rural Americans Looking for High-Speed Services, Adequate Broadband Speeds Remain Out of Reach for Many Federal Communications Commission January 30, 2015 High-speed
More informationTRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith
TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith Types of Data at Stake Residents, constituents, employees PII Personally Identifiable
More informationCyber/Information Security Insurance. Pros / Cons and Facts to Consider
1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner
More informationThe Importance of Privacy & Data Security in a Changing World
Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but
More informationHIPAA Privacy and Security and Research
ICTS Brown Bag Seminar Successful Completion: Participants must complete an evaluation form to receive a certificate of completion Contact Hours: 1 contact hours is available to those who meet the successful
More informationPublic School Teacher Experience Distribution. Public School Teacher Experience Distribution
Public School Teacher Experience Distribution Lower Quartile Median Upper Quartile Mode Alabama Percent of Teachers FY Public School Teacher Experience Distribution Lower Quartile Median Upper Quartile
More informationLLC Domestications. Date: March 23, 2015. [LLC Domestication] [March 23, 2015]
Topic: Question by: : LLC Domestications Earl B. Weaver, Jr. Illinois Date: March 23, 2015 Manitoba Corporations Canada Alabama Alaska Arizona Alabama has removed the term domestication from our Code for
More informationBrief. The BakerHostetler Data Security Incident Response Report 2015
Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the
More informationData Breach: Understanding the Risk and Managing a Crisis
May 19, 2010 Data Breach: Understanding the Risk and Managing a Crisis www.marsh.com Welcome Marni Storey Vice President Marsh Minneapolis 612.692.7608 marni.j.storey@marsh.com Agenda Welcome Speaker:
More informationThree-Year Moving Averages by States % Home Internet Access
Three-Year Moving Averages by States % Home Internet Access Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationNetwork Security and Privacy Liability: How to Prepare for a Cyber Breach
Wells Fargo Insurance Services Risk Series Seminar Presents: Network Security and Privacy Liability: How to Prepare for a Cyber Breach July 18, 2012 Panelists: Melissa Krasnow, Dorsey & Whitney Anne De
More informationDefinitions of Child Abuse and Neglect
State Statutes Current Through July 2009 Definitions of Child Abuse and Neglect Electronic copies of this publication may be downloaded at Child abuse and neglect are defined by Federal and State laws.
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More informationALABAMA DEFENSE LAWYERS ASSOCIATION
ALABAMA DEFENSE LAWYERS ASSOCIATION Spring 2015 Vol. 31 No. 1 Michael E. Upchurch Mobile, Alabama President 2015-2016 ANNUAL MEETING June 18-21, 2015 ~ Sandestin Golf and Beach Resort, Baytowne BIBB ALLEN
More informationSend the Form 8821, with a COPY of your Application to the IRS at the Following address:
STATE OF CALIFORNIA DEPARTMENT OF INDUSTRIAL RELATIONS Division of Labor Standards Enforcement Licensing & Registration Unit 455 Golden Gate Avenue, 9 th Floor San Francisco, CA 94102 Tel: (415) 703-4848
More informationRETAIL INSTALLMENT CREDIT AGREEMENT
RETAIL INSTALLMENT CREDIT AGREEMENT In this Agreement, the words you and your refer to any person who signs this Agreement, has requested and is issued a Tiffany & Co. credit card, or is authorized to
More informationExploring the Impact of the RAC Program on Hospitals Nationwide
Exploring the Impact of the RAC Program on Hospitals Nationwide Overview of AHA RACTrac Survey Results, 4 th Quarter 2010 For complete report go to: http://www.aha.org/aha/issues/rac/ractrac.html Agenda
More information14-Sep-15 State and Local Tax Deduction by State, Tax Year 2013
14-Sep-15 State and Local Tax Deduction by State, Tax Year 2013 (millions) deduction in state dollars) claimed (dollars) taxes paid [1] state AGI United States 44.2 100.0 30.2 507.7 100.0 11,483 100.0
More informationList of State Residual Insurance Market Entities and State Workers Compensation Funds
List of State Residual Insurance Market Entities and State Workers Compensation Funds On November 26, 2002, President Bush signed into law the Terrorism Risk Insurance Act of 2002 (Public Law 107-297,
More informationTax Research: Understanding Sources of Tax Law (Why my IRC beats your Rev Proc!)
Tax Research: Understanding Sources of Tax Law (Why my IRC beats your Rev Proc!) Understanding the Federal Courts There are three levels of Federal courts that hear tax cases. At the bottom of the hierarchy,
More informationData Security Breach Notice Letter
View the online version at http://us.practicallaw.com/3-501-7348 Data Security Breach Notice Letter DANA B. ROSENFELD & ALYSA ZELTZER HUTNIK, KELLEY DRYE & WARREN LLP A letter from a company to individuals
More information********************
THE SURETY & FIDELITY ASSOCIATION OF AMERICA 1101 Connecticut Avenue, N.W., Suite 800 Washington, D. C. 20036 Phone: (202) 463-0600 Fax: (202) 463-0606 Web page: www.surety.org APPLICATION Application
More informationWritten Testimony of Michael Menapace. Sen. Jerry Moran, Sen. Blumenthal, and other members of the Subcommittee -
Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security Hearing entitled Examining the Evolving Cyber Insurance Marketplace. Thursday, March 19, 2015 Written Testimony of Michael
More informationRegistered Nurses in Wyoming Fact Sheet Prepared for Statewide Nursing Summit University of Wyoming - June 18, 2004
Data Prepared by 307.473.3837 william.glover@state.wy.us Publications Relevant to Data Presented Glover, W. (2003), Nursing in Wyoming Part III. Wyoming Labor Force Trends. April 2003,, Research & Planning,
More informationUnderstanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed
More informationNational Credit Union Administration. Tips to Safely Conduct Financial Transactions Over the Internet
National Credit Union Administration Tips to Safely Conduct Financial Transactions Over the Internet NCUA 8061 January 2007 Introduction As use of the Internet continues to expand, more credit unions are
More informationMASS MARKETING OF PROPERTY AND LIABILITY INSURANCE MODEL REGULATION
Table of Contents Model Regulation Service January 1996 MASS MARKETING OF PROPERTY AND LIABILITY INSURANCE MODEL REGULATION Section 1. Section 2. Section 3. Section 4. Section 5. Section 6. Section 7.
More informationI. VIOLATIONS OF THE FEDERAL BANK ROBBERY AND INCIDENTAL CRIMES STATUTE, TITLE 18, UNITED STATES CODE, SECTION 2113
U.S. DEPARTMENT OF JUSTICE FEDERAL BUREAU OF INVESTIGATION WASHINGTON, D.C. 20535-0001 BANK CRIME STATISTICS (BCS) FEDERALLY INSURED FINANCIAL INSTITUTIONS January 1, 2014 - December 31, 2014 I. VIOLATIONS
More informationData Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States
Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States Introduction When it comes to Personally Identifiable Information (PII), privacy laws and regulations
More informationWHAT TO DO BEFORE AGREEING TO PERFORM WORK IN ANOTHER STATE. David M. Gersh
WHAT TO DO BEFORE AGREEING TO PERFORM WORK IN ANOTHER STATE David M. Gersh Before beginning work on a roofing project in another state or even bidding on work in another state, roofing contractors must
More informationCloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC
Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC Disclaimer THIS PRESENTATION IS TO ASSIST IN A GENERAL
More informationDOCUMENT CHECKLIST FOR LOANS $50,000 OR LESS: 1. BUSINESS LOAN APPLICATION FOR LOANS $50,000 OR LESS
DOCUMENT CHECKLIST FOR LOANS $50,000 OR LESS: 1. BUSINESS LOAN APPLICATION FOR LOANS $50,000 OR LESS 2. FORM 4506-T REQUEST FOR IRS TRANSCRIPTS (Business Name & FED ID Number; personal name & social security
More informationManaging Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
More informationComparison of US State and Federal Security Breach Notification Laws. Current through August 26, 2015
Comparison of US State and Federal Security Breach Notification Laws Current through August 26, 2015 Alaska...2 Arizona...6 Arkansas...9 California...11 Colorado...19 Connecticut...21 Delaware...26 District
More informationCYBER SECURITY SPECIALREPORT
CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber
More informationNON-RESIDENT INDEPENDENT, PUBLIC, AND COMPANY ADJUSTER LICENSING CHECKLIST
NON-RESIDENT INDEPENDENT, PUBLIC, AND COMPANY ADJUSTER LICENSING CHECKLIST ** Utilize this list to determine whether or not a non-resident applicant may waive the Oklahoma examination or become licensed
More informationFACT SHEET. Language Assistance to Persons with Limited English Proficiency (LEP).
FACT SHEET Office of Civil Rights Washington, D.C. 20201 (202) 619-0403 Language Assistance to Persons with Limited English Proficiency (LEP). To ensure that persons with limited English skills can effectively
More informationState Government Subsidies for Retirement Plans Sponsored by Local Governments. National Conference of State Legislatures, January 2010
Government Subsidies for Retirement Plans Sponsored by Local Governments National Conference of State Legislatures, January 2010 In many states, city and county governments, independent school districts,
More informationSubject: Military Personnel Strengths in the Army National Guard
United States General Accounting Office Washington, DC 20548 March 20, 2002 The Honorable John McHugh Chairman The Honorable Vic Snyder Ranking Member Military Personnel Subcommittee Committee on Armed
More informationGovernment Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution
Government Focus on Cybersecurity Elevates Data Breach Legislation by Experian Government Relations and Experian Data Breach Resolution Will Congress pass data breach legislation in 2015/2016? Recent high-profile
More informationCloudy With a Chance Of Risk Management
Proudly presents Cloudy With a Chance Of Risk Management Toby Merrill, ACE USA John Mullen, Nelson Levine de Luca & Hamilton Shawn Melito, Immersion Ltd. Michael Trendler, ACE INA Canada What is Cloud
More information