IDENTITY THEFT AND DATA BREACH CONFERENCE 2016
|
|
|
- Jonathan Phelps
- 10 years ago
- Views:
Transcription
1 IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President - Canadian Identity Theft Prevention Association 9:00am 10:00am Keynote Speaker Privacy and Data Breaches New Legislation and Mandatory Reporting 10:00am 10:15am 10:15am 11:45am Panel 1: Understanding Data Breaches This opening panel will provide attendees with a high level yet comprehensive review of the top strategies being employed by identity criminals, the most up-to-date trends and the wide scope of impacts that data breaches have on both organizations and the public
2 at large. Each speaker will examine data breaches from the following three streams; IT, Policy/Legal, and Victims/Clients. Moderator: Darrell Evans President, Canadian Institute of Information and Privacy Studies and Founder of the BC Freedom of Information and Privacy Association 1. IT Speaker To be announced 2. Policy / Legal Speaker Pippa Lawson - Barrister & Solicitor; Consultant at Philippa Lawson, Barrister & Solicitor. Legal counsel for the Yukon Government 3. Victims / Clients Stream Speaker Dr. Sue Sproule - Assistant Professor - Information Systems Brock University. Co-author of Identity Theft and Fraud: Evaluating and Managing Risk 11:45am 1:00pm Lunch Keynote Dr. Ann Cavoukian Executive Director of the Privacy and Big Data Institute at Ryerson University and former Information and Privacy Commissioner of Ontario. (Appearing via video) 1:00pm 2:30pm Panel 2 Understanding the New Canadian Data Breach Notification Legislation This second panel will focus on the recently legislated Data Protection Act which amends the Personal Information Protection and Electronics Documents Act (PIPEDA) creating new substantial legal requirements and operational procedures for organizations to design and implement. Each panelist will examine the new Canadian data breach legislation from the following three streams; IT, Policy/Legal, and Victims/Clients. Moderator: Tamir Israel, Staff Lawyer - Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Cara-Lynn Stelmack, Director, Mediation and Investigation Team - The Office of the Information and Privacy Commissioner of Alberta 2. Office of the Privacy Commissioner of Canada Staff To be announced
3 2:30pm 3:00pm Special Presentation 3:00pm 3:15pm 3:15pm 4:45pm out Session 1: Preparing For And Preventing A Data Breach These 3 out Sessions will allow conference attendees to focus in on their specific areas of responsibility within the three programmed streams of IT, Public Policy and Victims/Clients. IT out Session Advanced IT and security solutions You're in the privileged position of preparing for and preventing a data breach. What specific steps should you take? In this session, we'll discuss industry best practices with real world solutions. Moderator: Kris Constable, Senior Advisor & Privacy Officer - PrivaSecTech 1. IT Specialist 2. IT Security Specialist Policy and Law out Session Emerging liability framework and standards for data security This breakaway session will explore emerging regulatory, common law and professional obligations and standards for data security in the legal, government and private sectors. Moderator: David Fewer, Executive Director, Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Law Society TBA 2. Government Standards TBA 3. Senior Legal Counsel - TBA
4 Victim / Client out Session Developing strategies to help protect your clients from becoming victims This breakaway session will explore four key strategies to prepare your organization for a data breach with regards to your clients, members and employees from becoming victims. 1st Strategy Engage and educate your clients, members and employees on best practices to ensure they have the necessary knowledge and tools to proactively lockdown their personal information. 2nd Strategy Develop a comprehensive communications and notification strategy for your clients/members and employees to be implemented in the event of a data breach as legislated by the newly enacted Data Privacy Act. 3rd Strategy - Create a crisis communications strategy and incident response plan. 4th Strategy Develop a victim support plan. Moderator: Darrell Evans - President of The Canadian Institute of Information and Privacy Studies and Founder of the BC Freedom of Information and Privacy Association 1. Jim Dorey, Executive Director of the Canadian Identity Theft Support Centre 2. Pippa Lawson - Barrister & Solicitor; Consultant at Philippa Lawson, Barrister & Solicitor. Legal counsel for the Yukon Government 3. Canadian Bankers Association TBA 4:45pm 5:00pm Day Closing Remarks Day 2 - Friday January 29, :30am 9:00am Registration
5 9:00am 9:15am Opening Remarks Conference Chair Kevin M. Scott, President - Canadian Identity Theft Prevention Association 9:15am 10:15am Key Note Minister of Department of Justice or Minister of Industry - TBA 10:15am 10:30am 10:30am 12:00pm Panel 3 - You ve Been Breached, What Now? This final panel will focus on the worst case scenario your organization has suffered a data breach. Upon entering this crisis situation your organization must be positioned to implement a multitude of critical actions in order to mitigate the potential harms to the public, your brand and your bottom line. The speakers on this panel will provide an overview of an overarching strategy that must be deployed at the first sign of a data breach. This high level strategic plan will include IT, legal, public relations and victims strategies. Moderator: Kevin M. Scott, President - Canadian Identity Theft Prevention Association 1. IT Expert TBA 2. Legal Expert - John Russo, Vice President Legal Counsel & Chief Privacy Officer, Equifax Canada 3. Public Relations Expert - Principal, Earnscliffe Strategy Group 12:00 1:30 Lunch - Keynote Speaker TBA 1:30 3:30 out Session 2: All Hands on Deck You ve Been Breached
6 These out Sessions will allow conference attendees to focus in on their specific areas of responsibility within the three programmed streams of IT, Public Policy and Victims/Clients. IT out Session Solutions for an organizational nightmere The dreaded call has come in, you've been breached. If you're not prepared, you won't know who to call or what to do next. It can also be very expensive to resolve and timimg is everything. In this session, you will hear real world experiences, as well as be provided a list of steps, with tips and tricks to minimize the impact and lockdown your organization. The panel will have both the experiences of those who've been breached, and those who have done the breaching. Moderator: Kris Constable, Senior Advisor & Privacy Officer - PrivaSecTech 1. Professional IT Specialist - TBA 2. Renowned Hacker and Security Expert - TBA Policy and Law out Session Security reporting, harm mitigation obligations and blackmail! As 100% security is impossible, you may face a breach regardless of what steps you take. When that occurs, you may face a range of complex issues. Should a discovered security vulnerability be reported? Would doing so cause harm by exposing other systems? Are there any obligations to mitigate potential harm to affected customers or clients and how far might these obligations go? What obligations might arise in extreme situations involving ransomeware or other types of blackmail? Moderator: Tamir Israel, Staff Lawyer - Canadian Internet Policy & Public Interest Clinic (CIPPIC) 1. Legal Expert TBA 2. Policy Expert TBA 3. Security Specialist - TBA Victim / Client out Session You ve been breached and it time to take immediate action. In this session the speakers will focus on how to design a 72 hour and a follow-up 30- day implementation strategy on how to ensure your organization is able to respond
7 effectively and efficiently to the breach. This will include direct communication with your customers, a crisis communications strategy and a plan reduce the likelihood that your clients will become victims of identity theft. Moderator: Darrell Evans, President of The Canadian Institute of Information and Privacy Studies and Founder, BC Freedom of Information and Privacy Association 1. Tim Ashby - Vice President, Equifax Canada 2. Jim Dorey - Executive Director, Canadian Identity Theft Support Centre 3. Principal - Earnscliffe Strategy Group. Crisis Communications Specialist 3:30pm 3:45pm 3:45pm 4:45pm Plenary Kevin M. Scott, President - Canadian Identity Theft Prevention Association 4:45pm 5:00pm Closing Remarks Kevin Scott President Canadian Identity Theft Prevention Association
KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT
OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 8 focused webinars for the latest legal developments, including: Session 1: September 16,
INDUSTRY GUIDE TO FINANCIAL PLANNING WEEK
INDUSTRY GUIDE TO FINANCIAL PLANNING WEEK Tips, Tools & Opportunities to Help Your Organization Make the Most of Financial Planning Week FINANCIAL PLANNING WEEK provides a significant opportunity for your
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
The Manitoba Child Care Association PRIVACY POLICY
The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
Privacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
28 th Annual Clinical Negligence Conference
SPONSORSHIP & EXHIBITION OPPORTUNITIES at the event for clinical negligence specialists 28 th Annual Clinical Negligence Conference 1 st 2 nd July 2016, Hilton Brighton Metropole Action against Medical
Helping to protect your business and your customers in the event of a data breach
Helping to protect your business and your customers in the event of a data breach Equifax Data Breach Assistance helps you respond more quickly and effectively, limiting the reputational damage to your
Cyber Liability Insurance:
Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major
Online Privacy: Make Youth Awareness and Education a Priority
Online Privacy: Make Youth Awareness and Education a Priority Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada For young people today, going online to connect and interact with
Privacy Law in Canada
by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually
Taking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
Office of the Information and Privacy Commissioner Province of British Columbia Order No. 16-1994 July 8, 1994
Office of the Information and Privacy Commissioner Province of British Columbia Order No. 16-1994 July 8, 1994 INQUIRY RE: A Request for Access to Records of the Insurance Corporation of British Columbia
Directory of Records. Workers Compensation Board Alberta
Directory of Records Workers Compensation Board Alberta Last updated: May 2005 Table of Contents WCB Mandate...3 Organization...3 Introduction...4 How the Directory is Organized...4 Access Point...4 Business
Helpful Tips. Privacy Breach Guidelines. September 2010
Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information
Cyber Risk and the Utility Industry
Cyber Risk and the Utility Industry Imran Ahmad Lawyer, Cassels Brock & Blackwell LLP Canadian Legal Landscape Personal Information Protection and Electronic Documents Act (PIPEDA) Federal legislation
DATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
NOT-FOR-PROFIT FINANCE LEADERSHIP DAY THURSDAY, NOVEMBER 12, 2015 CHELSEA HOTEL, TORONTO FINANCE AND STRATEGY
NOT-FOR-PROFIT FINANCE LEADERSHIP DAY THURSDAY, NOVEMBER 12, 2015 CHELSEA HOTEL, TORONTO FINANCE AND STRATEGY For Professionals. By Professionals. Your Pathway To Success. CPA Ontario s Not-for-Profit
Privacy by Design Setting a new standard for privacy certification
Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,
CURRICULUM VITAE. Telephone: 416-366-3811 E -Mail: [email protected]. TODD WHITE is a senior Toronto criminal lawyer.
CURRICULUM VITAE TODD BRETT WHITE, B.A. (Hons), LL.B. Barrister Canada Life Building 330 University Avenue Fifth Floor Toronto, Ontario, Canada M5G 1R7 Telephone: 416-366-3811 E -Mail: [email protected]
Real Estate Council of Alberta. An introduction 1
Real Estate Council of Alberta An introduction 1 2 Real Estate Council of Alberta - An introduction Welcome At the heart of Alberta s real estate industry is an organization where people work cooperatively
CARIBBEAN SOCIAL MEDIA MARKETING SUMMIT 2015
ASSOCIATION OF CARIBBEAN CORPORATE COUNSEL ( ACCC ) PRESENTS ITS CARIBBEAN SOCIAL MEDIA MARKETING SUMMIT 2015 24 TH JULY 2015 Courtyard Marriott, Port of Spain, Trinidad 7:45AM - 8:45AM REGISTRATION CHECK
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
D EBORAH C. A NSCHELL
D EBORAH C. A NSCHELL 128 Ledbury St. Toronto, ON M5M 4H9 Res: 416.322.8066 e-mail: [email protected] BAR ADMISSIONS Admitted to the Law Society of British Columbia on August 27, 1993 Admitted to the
CURRICULUM VITAE. BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada)
CURRICULUM VITAE BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada) HELLER, RUBEL Barristers 120 Adelaide Street West Suite 1902 Toronto, Ontario M5H 1T1 business:
Preliminary Agenda As of Friday, April 15, 2016
Preliminary Agenda As of Friday, April 15, 2016 Monday, April 25 2:00pm 6:30pm 2:00pm 2:45pm Registration 101 Overview Sessions Join IRI, DTCC and ACORD for an update on today s industry workgroups and
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
Put your Head in the Cloud at Phorum
Put your Head in the Cloud at Phorum There is no question that cloud computing and cloud strategies are at the forefront of many business leaders minds and budgets. CxOs have their heads in the clouds,
Privacy in the Workplace Update What You Don t Know May Hurt You
McCarthy Tétrault Advance Building Capabilities for Growth Privacy in the Workplace Update What You Don t Know May Hurt You Rosalie Cress Will Cascadden Employees Rights to Privacy in the Workplace 2 Federal
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
3. Consent for the Collection, Use or Disclosure of Personal Information
PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
Discussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
PRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
CHBA Briefing Note on Liability in the Residential Building Industry
CHBA Briefing Note on Liability in the Residential Building Industry Introduction Objectives The objective of this report is to present some recent developments in Canada on the topic of liability in the
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
BRIAN J. BURKE CURRICULUM VITAE. Work involves all aspects of family law. David Eklove Charles Associate. Thorsteinssons LLP, Tax Lawyers Associate
BRIAN J. BURKE CURRICULUM VITAE PROFESSIONAL EXPERIENCE June 2004 present Epstein Cole LLP Partner (2008 to present); Associate (2004 to 2008) Work involves all aspects of family law May 2002 May 2004
Cloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions
Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions October 2008 Information and Privacy Commissioner of Ontario
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
News, Events & Publications
News, Events & Publications Kenneth Jull Presentations Panel Member, Canada-China Institute for Business & Development, Chinese Immigrants Doing Business in Canada Conference Program, Ryerson University,
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
FRONTIER COLLEGE FORUM: LITERACY S IMPACT ON CRIMINAL JUSTICE AND YOUTH
FRONTIER COLLEGE FORUM: LITERACY S IMPACT ON CRIMINAL JUSTICE AND YOUTH A REPORT PREPARED FOR GREAT-WEST LIFE, LONDON LIFE AND CANADA LIFE, MARCH 2014 On February 20, 2014, Frontier College hosted a national
EXECUTIVE DEVELOPMENT
EXECUTIVE DEVELOPMENT ppforum.ca Introduction The Public Policy Forum is Canada s premier convener of multi-sector dialogue. Our central purpose is helping Canadians across the public, private, non-profit
State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH
State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION Effective August 31, 2007 Publication Name(s): Version #(1): ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES
立 法 會 Legislative Council
立 法 會 Legislative Council LC Paper No. CB(2)2496/11-12 (These minutes have been seen by the Administration) Ref : CB2/PS/4/10 Panel on Transport and Panel on Financial Affairs Joint Subcommittee on Issues
Innovating for quality
Webninar Virtual Event in partnership with Education Fast Forward Monday 7 March Workshops Tuesday 8 March Innovating for quality Symposium Wednesday 9 March Thursday 10 March Provisional Programme 7 11
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
Nonprofit risk management
Nonprofit risk management Mary Mancuso Nonprofit organizations face unique risk management challenges. They are often held to the same standards as for-profit organizations but do not have the same resources
cyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario
PRIVACY COMPLIANCE ISSUES FOR LAW FIRMS IN ONTARIO By Sara A. Levine 1 Presented at Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario Ontario Bar Association, May 6,
