Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I
|
|
|
- Veronica Shelton
- 10 years ago
- Views:
Transcription
1 Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation Part I March 20, 2014
2 Speakers John J. Sullivan, Partner, rejoined Mayer Brown after serving as General Counsel at the US Department of Commerce in 2005 and then, following his nomination by President Bush and confirmation by the Senate, as Deputy Secretary until At Commerce, John was the senior official responsible for the Department s cyber security and worked closely with NSAto address threats posed by foreign governments and transnational criminal/terrorist organizations. From 2003 to 2005, he served as Deputy General Counsel of the Department of Defense, where he was the senior lawyer responsible for all of the Department s litigation, including its most sensitive national security cases. He is a former law clerk for Judge John Minor Wisdom and Supreme Court Justice David H. Souter. Howard Waltzman, Partner, is a partner in our Government Relations practice in the Washington, DC office. Howard focuses his practice on communications and Internet law and privacy compliance. He represents some of the nation s leading communications service providers, manufacturers and trade associations in regulatory, compliance and legislative matters, including with respect to Internet and wireless services, privacy, video programming and cyber security. Stephen Lilley, Associate, is a Litigation & Dispute Resolution associate in Mayer Brown's Washington DC office and a member of the firm s Supreme Court & Appellate practice. He joined the firm in 2013, having previously worked for the Senate Judiciary Committee as Chief Counsel to the Subcommittee on Crime and Terrorism, and as Chief Counsel to the Subcommittee on Administrative Oversight and the Courts. 1
3 Agenda A. Data Breach Contemplated legislative responses Possible regulatory responses Preview of April 17th webinar on data breach litigation B. The NIST Framework for Cybersecurity The origin, purpose, and content of the Framework v. 1.0 Considerations for companies The leverage the Framework seeks to exert Possible regulatory actions Implications for possible litigation 2
4 PART A Data Breach 3
5 There Has Been Renewed Interest in a Legislative Response to Data Breaches Congressional interest in data breach notification and data security legislation has been renewed by recent high profile breaches The Target and Neiman Marcus breaches have garnered particular attention Other recent victims have included banks, startups, colleges, hospitals, and grocery stores Policymakers seek to protect privacy and enhance security Disagreement over how to achieve these goals has been sharp 4
6 The Legislative Debate Presents a Series of Significant Policy Questions How prescriptive should data security standards be? Should such standards be established through regulations? What entities should be covered by new requirements? To what extent should state law be preempted? Should the law provide a private right of action? Should the FTC have primary, exclusive, or shared jurisdiction? What role should state attorneys general and state enforcement agencies have in enforcement of the law? 5
7 There Are Indications That the House Energy and Commerce Committee May Consider Legislation Representative Lee Terry (NE-2) held a hearing on February 5th, 2014 to consider recent data breaches Rep. Terry chairs the Energy and Commerce Committee s Subcommittee on Commerce, Manufacturing and Trade At the hearing, Rep. Terry explained that he opposes codifying detailed, technical standards or... overly cumbersome mandates and seeks to facilitate private sector [f]lexibility, quickness and nimbleness Representative Terry also has indicated interest in exploring legislation on this topic 6
8 Senate Legislation: The Toomey-King Bill, S There are a number of bills that have been introduced in the Senate The Toomey-King legislation would: Require entities within the FTC s 5 jurisdiction and common carriers subject to the FCC, see 4(a)(1)-(2), to protect data pursuant to a reasonableness standard, 2 Require those covered entities to notify affected individuals if the entity reasonably believes that a breach has caused or will cause financial harm, 3(a)(1) Be self-executing and not require rulemaking 7
9 Senate Legislation: The Carper-Blunt Bill, S The bill focuses on financial institutions, but covers any entity that maintains or communicates sensitive account information or sensitive personal information, 2(7)(a) The Carper-Blunt bill is before the Banking Committee. It would: Require reasonable data security practices, 3(a)(1), and notification to consumers if a breach is reasonably likely to cause substantial harm or inconvenience to consumers, 3(c) Require financial regulators (e.g. OCC, FDIC, etc.) and the FTC to issue implementing regulations as to entities within their enforcement jurisdiction, 4-5 8
10 Senate Legislation: The Rockefeller bill, S. 1976, and the Leahy bill, S The Chairmen of the Senate Commerce and Judiciary Committees have also introduced data security legislation The two bills are similar in many respects and differ primarily as to the roles of the FTC and the Justice Department. Each bill would: Establish stringent new data security standards (the Rockefeller bill through FTC regulation, the Leahy bill by statute and regulation) Require notification after a breach, even absent likely harm Allow enforcement by state attorneys general 9
11 Regulatory Enforcement is PoisedtoContinue at Both the State and Federal Levels The FTC continues to attempt to police data security practices through enforcement actions The Wyndham and LabMDactions will determine the scope of the FTC s data security authority going forward As demonstrated in California, state regulators also are likely to continue to be active California AG Kamala Harris has announced the prioritization of data breach investigations California s breach notification requirement recently was expanded to be triggered by breach of a user name or address, in combination with a password or security question and answer that would permit access to an online account 10
12 Data Breach Litigation Continues to Evolve and Expand in Significant Ways The upcoming second part of this webinar, on April 17th, 2014, will consider issues including: Developments in data breach litigation New data breach and notification laws Enforcement efforts by state attorneys general Measures to prevent and defend against data breach lawsuits 11
13 PART B: The NISTCybersecurity Framework v. 1.0 Legal and Regulatory Implications 12
14 The NISTFramework Has Its Roots in the Failed 2012 Effort to Pass Comprehensive Cybersecurity Legislation In the summer of 2012, Congress considered cyber threats to critical infrastructure: The Senate considered legislation that would have allowed the creation, through regulation, of mandatory cybersecurity standards for critical infrastructure When this approach stalled, a compromise was considered under which incentives, including liability protections, would be given in exchange for adoption of new voluntary cybersecurity standards After the legislation failed, President Obama issued Executive Order 13636, which ordered the creation of the NIST Framework 13
15 EO13636 Included Four Key Directives Regarding the NIST Framework The National Institute of Standards and Technology (NIST) was tasked with creating the Cybersecurity Framework The Department of Homeland Security was tasked with creating a voluntary program to support adoption of the Framework A number of agencies were tasked with evaluating which incentives including liability protections would properly support adoption of the Framework Regulatory agencies were required (or urged, in the case of independent agencies) to consider whether to act in response to the Framework 14
16 Like the Executive Order, the NISTFramework Focuses on Critical Infrastructure Critical Infrastructure is defined in the Executive Order and the Framework as: [S]ystemsand assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters 15
17 The NISTFramework v. 1.0 Is Consistent With the Principles Behind the Executive Order The Framework is based on industry expertise and best practices and ultimately is intended to be administered outside the government Adoption of the Framework and participation in the DHS program is voluntary The Framework reflects a risk-based approach to cybersecurity: It is not one-size-fits-all It is nota checklist It is not technology specific 16
18 Framework Element One: the Framework Core The Framework Core presents cybersecurityoutcomes identified as helpful in managing cybersecurity risk The Framework Core is broken into four elements: FUNCTIONS CATEGORIES SUBCATEGORIES INFORMATIVE REFERENCES The most general description of security activities e.g. Detect, Respond Provide the elements of the basic functions e.g. Asset Management, Access Control Divide categories into specific technical outcomes e.g. Data-atrest is protected Specific standards, guidelines, and practices associated with each subcategory 17
19 Framework Element Two: the Framework Implementation Tiers The Framework Implementation Tiers provide entities with a means to categorize their overall cybersecurity performance The four Framework Implementation Tiers are Partial, Risk Informed, Repeatable, and Adaptive Each tier is expressed in terms of Risk Management Process, Integrated Risk Management Program, and External Participation Tiers do not represent maturity levels, so a company s tier alone is not a measure of cybersecurity success 18
20 Framework Element Three: the Framework Profiles NISTdescribes a Framework Profile as the alignment of the Functions, Categories, and Subcategories with the business requirements, risk tolerance, and resources of the organization NISTalso explains that an entity may generate a Current Profile and a Target Profile In other words, Framework Profiles are the products of a company s analysis of their current posture and their goals 19
21 Companies Now Must Decide How to Respond to the Framework Companies should make informed business decisions about their cybersecurity this is not just a technical issue Key considerations include: The leverage the Framework is intended to exert on industry Possible regulatory activity based on the Framework Possible efforts to use the Framework in litigation Critical infrastructure companies are most directly affected, but other companies also will be wise to consider the implications of the Framework 20
22 The NISTFramework Has Always Been Intended to Shift Private Sector Behavior Through Leverage Neither EO13636 nor the NISTFramework attempt to shift industry behavior through civil liability However, the Framework, by creating a common vocabulary, is intended to: Support the development of private cybersecurity insurance markets Facilitate the use of cybersecurity standards in vendor and service provider contracts Close the gap between the CEO and the CISOregarding knowledge and appreciation of cybersecurity risks 21
23 Driving Improved CybersecurityThrough An Expanding Insurance Market Has Been a Lever of Particular Focus The Department of Homeland Security has held multiple stakeholder events on ways to support this market The basic theory has been that insurance companies will drive insured companies to maintain appropriate, risk-based practices The growth trajectory in this market remains uncertain, but anecdotal evidence is beginning to emerge that some insurance companies are working with their clients to strengthen cybersecurity 22
24 EO13636 Directs Regulatory Agencies to Review and Respond to the Framework The EOrequires relevant regulatory agencies to consider prioritized, risk-based, efficient, and coordinated actions to mitigate cyber risk, 10(a)-(b), and independent agencies are encouraged to take similar steps, 10(e) Regulators should refrain from any effort to turn this voluntary program into a mandatory one: Standards were not designed as mandates Program should be given time to function as intended Companies should continue to educate their regulators about risk-based cybersecuritypractices, improvements for the Framework, and the risks of mandatory regulation 23
25 The SEC Will Be Particularly Worth Watching, Since It Already Has Engaged On Cybersecurity Issues In October 2011, SEC staff issued guidance about disclosures relating to cybersecurity The SEC staff explained that registrants should review the adequacy of disclosure of cybersecurity risks and cyber incidents Since the issuance of the 2011 guidance, the SEC has questioned companies about their cyber risk disclosures The SEC has issued at least 50 comment letters regarding cyber disclosures and companies have been forced to amend filings The SEC will hold a cybersecurity roundtable on 3/26/14 24
26 Until The SEC Speaks More Clearly, Registrants Should Consider if the Framework Can Inform Disclosures The Framework is intended to provide a common vocabulary to communicate cybersecurity posture Registrants and particularly owners and operators of critical infrastructure should consider whether this common vocabulary actually will be helpful in disclosing the cyber risks Considerations will include: How broadly the Framework has been adopted in a sector and used in disclosures by registrants in that sector; and Whether the Framework is helpful to disclose the particular cyber risks facing the registrant 25
27 Financial Regulators May Issue New Industry Guidance Based On the Framework Last June, the interagency Federal Financial Institutions Examination Council established a cybersecurity working group to further promote coordination on cybersecurity OCC head Thomas Curry testified this February that the FFIEC was exploring additional approaches bank regulators can take to ensure that institutions of all sizes have the ability to safeguard their systems Any resulting guidance is likely, at a minimum, to inform supervisory examinations going forward 26
28 A Range Of Regulators Also May Be Tempted to Try to Use the Framework in Enforcement Actions The FTC has not indicated whether it sees a role for the Framework in data breach litigation The CFPB has taken an exceptionally broad view of its jurisdiction and its vague and expansive authorities To date, the CFPB has not engaged on cybersecurityissues Notably, the CFPB can bring enforcement actions for abusive practices that, inter alia, take unreasonable advantage of the reasonable reliance by the consumer on a covered person to act in the interests of the consumer, 12 U.S.C. 5531(d)(2) 27
29 Companies Should Fight Any Efforts By the Plaintiff s Bar to Turn the Framework Into Binding Standards Attempts to transform elements of the Framework and particularly the Framework Core into binding legal standards, whether in negligence actions or other suits, would be contrary to the purposes of the EO and the NIST Framework Such efforts should be strongly resisted since they: Would reduce stakeholder interest in collaborating on consensus standards Are inconsistent with risk-based cybersecurity practices Would harm cybersecurity since the success of such actions would create static and immediately obsolete standards 28
30 Companies Also Should Anticipate Securities Class Actions Seeking to Make Use Of the Framework Observers have recognized the possibility that the plaintiff s bar may press securities litigation alleging material omissions or misrepresentations about cyber risks Given that such lawsuits may be inevitable, businesses that own or operate critical infrastructure will want to take account of the Framework in evaluating and disclosing cyber risks Other registrants also will want to consider whether they can insulate themselves from securities litigation through the principles underlying the Framework 29
31 Companies Also Should Consider the Possibility of Actions Against Directors and Officers That Reference the Framework Derivative actions that allege breach of the duty of care or breach of the duty of loyalty may be raised Evaluating and managing cybersecurity against the Framework, or comparable risk-based practices should trigger the protections of the business judgment rule E.g., In re Citigroup Inc. Derivative Litig., 964 A.2d 106, (Del. Ch. 2009) As other commentators also have suggested, the duty of loyalty may be implicated if plaintiffs allege the unconsidered failure of the board to act Id. at
32 Case Law Under UCCArticle 4A May Also Be Informed By the Framework Going Forward UCCArticle 4A governs liabilities for commercial funds transfers, and limits liabilities for banks with commercially reasonable security procedures In PatcoConstruction Company, Inc. v. People s United Bank, 684 F.3d 197 (1st Cir. 2012), the Court found the one size fits all cybersecurity of a community bank not commercially reasonable Although every bank will not qualify as critical infrastructure, use of the Framework may help banks ensure commercial reasonableness after Patco 31
33 Wrap-Up and Questions Data breach Cybersecurity and the NIST Framework Further considerations Questions? John J. Sullivan Partner Howard W. Waltzman Partner Stephen Lilley Associate
34 Mayer Brown is a global legal services provider comprising legal practices that are separate entities (the "Mayer Brown Practices"). The Mayer Brown Practices are: Mayer Brown LLP and Mayer Brown Europe-Brussels LLP both limited liability partnerships established in Illinois USA; Mayer Brown International LLP, a limited liability partnership incorporated in England and Wales (authorized and regulated by the Solicitors Regulation Authority and registered in England and Wales number OC ); Mayer Brown, a SELASestablished in France; Mayer Brown JSM, a Hong Kong partnership and its associated entities in Asia; and Tauil & Chequer Advogados, a Brazilian law partnership with which Mayer Brown is associated. "Mayer Brown" and the Mayer Brown logo are the trademarks of the Mayer Brown Practices in their respective jurisdictions. 33
Perspectives on Cybersecurity and Its Legal Implications
Survey Results 2015 Perspectives on Cybersecurity and Its Legal Implications a 2015 survey of corporate executives The National Institute of Standards and Technology (NIST), a non-regulatory agency of
Long-Expected Omnibus HIPAA Rule Implements Significant Privacy and Security Regulations for Entities and Business Associates
Legal Update February 11, 2013 Long-Expected Omnibus HIPAA Rule Implements Significant Privacy and Security Regulations for Entities and Business Associates On January 17, 2013, the Department of Health
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
The Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President
004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive
The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School
The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School MARCH 31, 2014 2013 Venable LLP 1 EO 13636: Improving Critical Infrastructure Cybersecurity Directs to NIST to develop
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis
Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
The NIST Cybersecurity Framework
View the online version at http://us.practicallaw.com/5-599-6825 The NIST Cybersecurity Framework RICHARD RAYSMAN, HOLLAND & KNIGHT LLP AND JOHN ROGERS, BOOZ ALLEN HAMILTON A Practice Note discussing the
Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
Billing Code: 3510-EA
Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]
Spring 2015 reforms: the new DC flexibilities
Spring 2015 reforms: the new DC flexibilities THE REFORMS AT A GLANCE y Until April 2015, members usually faced serious tax penalties if they did not spend at least 75% of their DC pots on an annuity meeting
Perspectives on Cyber Security & Digital Issues
Perspectives on Cyber Security & Digital Issues Gary R. Bronstein June 12, 2014 2014 Kilpatrick Townsend Background Cyber security and prevention of data breaches are increasing in importance in the wake
Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS
114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
what your business needs to do about the new HIPAA rules
what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015
Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015 CONTENTS: PROGRAM SCHEDULE... 11 FACULTY BIOS... 19 1. Big Picture Cyber: Threats, Vulnerabilities and
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
Technological Evolution
Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Consumer Privacy & Big Data Advice, Regulatory and Resulting Litigation Denise Banks Chief Privacy Officer BMO Financial
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Negotiating ERP Implementation Agreements for Success
Negotiating ERP Implementation Agreements for Success Paul Chandler 312 701 8499 [email protected] Paul Roy 312 701 7370 [email protected] Business & Technology Sourcing Practice "An excellent
New York State Department of Financial Services Proposes a BitLicense Regulatory Framework for Virtual Currency Businesses
Legal Update August 6, 2014 New York State Department of Financial Services Proposes a BitLicense Regulatory Framework for Virtual Currency Businesses The New York State Department of Financial Services
Big Data and Cybersecurity: Standards for Safeguarding Personal Information
White Paper Big Data and Cybersecurity: Standards for Safeguarding Personal Information Domestic and multinational companies are increasingly focused on safeguarding personal information due largely to
Lawyers and Social Media: The Legal Ethics of Tweeting, Facebooking and Blogging
Lawyers and Social Media: The Legal Ethics of Tweeting, Facebooking and Blogging Anthony Diana, Partner 212 506 2542 [email protected] Michael Lackey, Partner 202 263 3224 [email protected] Mayer
When Can We Expect a Federal Data Breach Notification Law?
When Can We Expect a Federal Data Breach Notification Law? The Trials and Tribulations of Getting a DBN Bill through Congress. Alexi Madon Director of State Government Affairs, Midwest Cybersecurity Overview
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
Gus P. Coldebella (@g_co) Partner, Goodwin Procter LLP Former General Counsel, Dept. of Homeland Security. What are we going to talk about today?
Cyber Security Meets Corporate Securities: The SEC's Authority to Regulate Companies' Cyber Defenses and Corporate Directors' Fiduciary Responsibilities Gus P. Coldebella (@g_co) Partner, Goodwin Procter
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
CHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033
CHAPTER 2016-138 Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 An act relating to information technology security; amending s. 20.61, F.S.; revising the
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION COMPLAINT FOR DECLARATORY JUDGMENT I.
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION JANICE LEE, ) ) Case No. Plaintiff, ) ) vs. ) ) BETHESDA HOSPITAL, INC. ) ) Defendant. ) ) COMPLAINT FOR DECLARATORY JUDGMENT
Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
FirstCarolinaCare Insurance Company Business Associate Agreement
FirstCarolinaCare Insurance Company Business Associate Agreement THIS BUSINESS ASSOCIATE AGREEMENT ("Agreement"), is made and entered into as of, 20 (the "Effective Date") between FirstCarolinaCare Insurance
