Society of Corporate Compliance & Ethics Data Security Technology 101 for Compliance Professionals
|
|
- Daniella Lindsey
- 8 years ago
- Views:
Transcription
1 Society of Corporate Compliance & Ethics Data Security Technology 101 for Compliance Professionals Jonathan Armstrong 29 th March 2015, London Cordery in 2005 Facebook didn t exist for most people, twitter was still a sound, the cloud was something in the sky, 3G was a parking space, applications were what you sent to colleges, and Skype was a typo. Thomas Friedman Cordery
2 Data Security Landscape Personal data has a value Different political reactions Different legal systems worldwide Different enforcement even within Europe Contrasting approach Europe v. US Snowden has changed the game Cordery Target 2 nd largest discount retailer in the US December 2013: data breach of Target's systems affected up to 110 million customers Russian teenager suspected 10% storewide discount in run up to Christmas Credit reporting Sales still down 3 4% (c.$17bn turnover company) 475 positions went in early 2014 including CIO CEO resigned in May Interim CEO "We're in a place when it comes to the data breach where we don't have visibility yet to potential third party liabilities and operating expenses they've incurred" $10 million class action settlement announced in March 2015 Shareholder actions to follow? Cordery Cordery
3 Privacy a view from Europe Profiling is a modern EVIL.... Technical social sorting is now so aggressive that it looks like the processes involved in the identification, ghettoization and elimination of the Jews in the 1940's... this group of people.. are actually now starving and they are often pushed into suicide. Their need for the Right to be Forgotten, executed as a physical erasure of all past data from all sources, is essential...the next class action should be taken by the old, who are also being pushed into destitution and who will be nudged into assisted suicide by the use of covert profiling. There is nothing trivial about the breaching or circumvention of data protection laws in these über technical times.. Cordery EU data protection law Principles based Local law varies Enforcement varies Prior registration can be required to collect data Steps must be taken if transferring data to the US (or most other non EU countries) Cordery Principle 2 Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Cordery
4 Example: Bank of Scotland Robbie Hastie Revealed details of Hibs players wages Pleaded guilty to DP offence of knowingly or recklessly disclosing information without consent 400 fine Bank of Scotland co operated Cordery Principle 3 Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Cordery Example: Deutsche Bahn Monitoring employees as anti corruption measures c.173,000 employees affected Reconciliation of employee data with data on 80,000 suppliers Collection of bank data of employees Interception of traffic Overall fines of 1.1m Cordery
5 Principle 6 Personal data shall be processed in accordance with the rights of data subjects Cordery Example: Big Brother 1,081,822 total fine 150,250 fine for lack of IS training, policy etc Appeal failed Cordery Principle 7 Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. Cordery
6 Example: UK ICO fine for MoJ Visitor to prison received with inmate s details Investigation revealed 2 other occasions when this happened One clerk responsible who had accidentally pasted the file into the s No proper DLP system in place Training inadequate ICO issues monetary penalty of 140,000 in October 2013 Cordery Example: Co Op Life Planning Software subcontractor uploaded customer details to cloud 82,000 records Details unencrypted & online No really sensitive data Co Op had appropriate policies ICO announced settlement on undertakings 26 th May 2011 Cordery Example: Sony Hack 2011 hack: Software not patched Hackers exploited known vulnerability 250,000 monetary penalty 2014 hack: Employees resigned Disruption to film schedules Talent protests ICO action? 99m fine under new EU rules? Cordery
7 Example: Dark Hotel Significant threats to corporate networks and executives Outlook diaries rarely protected Issues around battery power and connectivity as the new opium Phishing spear phishing watering hole VPN compromise Cordery Prevention Dutch CBP: Contingency plan Every organisation should have a contingency plan indicating exactly what is to happen in the event of an emergency. However, such a plan is useful only if personnel are familiar with it and regular drills have been held to practise its implementation... Cordery Questions Jonathan Armstrong Cordery jonathan.armstrong@corderycompliance.com +44 (0) Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and Affiliate Offices New York London Singapore Los Angeles Chicago Houston Hanoi Philadelphia San Diego San Francisco Baltimore Boston Washington, D.C. Las Cordery Vegas Atlanta is a trading Miami Pittsburgh name of Newark Cordery Boca Raton Compliance Wilmington Limited. Cherry Hill Authorised Lake Tahoe Ho and Chi regulated Minh City Duane by the Morris Solicitors LLP A Delaware Regulation limited liability Authority. partnership SRA number Company number registered in England and Wales. VAT number: Registered office: Lexis House, 30 Farringdon Street, London, EC4A 4HH, United Kingdom 7
8 New EU data rules Suppliers outside EU in scope Right to be forgotten More SARs & removal of the SARs fee Cordery New EU data rules Proposed Regulation not Directive Fines of 2% of global turnover Toughened enforcement bodies Consent less of an option Breach reporting in 24 hours? Cordery Right to be forgotten Google case Extra territorial reach including US corporations Huge increase in burden on companies in all sectors Not limited to search engines o Internal investigations o AML o Due diligence o Employment Bad boy s charter? Cordery
9 Privacy class actions Proposed new German law The Schrems case Cordery Reduced ability to do background checks New UK law applies from 10 March 2015 Bans forced SARs Criminal offence unlimited fine in the Crown Court Cordery Demographics LinkedIn Specimen Company in 2010 Over 2,000 employees signed up 5,907 followers Average age 33 years Average tenure 3 years Cordery
10 Security issues Less job security Ability to do more damage Volatile stock prices Lower trading volumes Quicker spread of information Cordery Cyber insurance Emerging market in Europe More mature market in the US Are some sectors uninsurable e.g. retail? Check carefully the policy you are buying Do proper due diligence on the insurer/underwriter Unlikely to be the whole answer Cordery The Perfect Storm More (& Less) More Reliance on 3 rd parties, e.g. outsourcing; SaaS; Cloud Cost pressure Regulation and enforcement Geography Social networking Value in stolen data Speed Whistleblowers Chance of getting caught Focus on investigations Subject militancy e.g. Google case People trying to rewrite the past because they can Less Care Compliance and legal resources Attention to contractual terms Vendor accountability Sympathy from courts & regulators Cordery
11 Resources Book Podcasts itunes New EU Data Rules Dark hotel The right to be forgotten Background checks Privacy class actions LinkedIn Cordery Questions Jonathan Armstrong Cordery +44 (0) Come and see us in the Exhibition Hall on table Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and Affiliate Offices New York London Singapore Los Angeles Chicago Houston Hanoi Philadelphia San Diego San Francisco Baltimore Boston Washington, D.C. Las Cordery Vegas Atlanta is a trading Miami Pittsburgh name of Newark Cordery Boca Raton Compliance Wilmington Limited. Cherry Hill Authorised Lake Tahoe Ho and Chi regulated Minh City Duane by the Morris Solicitors LLP A Delaware Regulation limited liability Authority. partnership SRA number Company number registered in England and Wales. VAT number: Registered office: Lexis House, 30 Farringdon Street, London, EC4A 4HH, United Kingdom 11
Big Data, Big Issues: Global Challenges and Effective Solutions
Big Data, Big Issues: Global Challenges and Effective Solutions Thomas Obermaier and Jonathan Armstrong SCCE Annual Compliance & Ethics Institute October 7, 2015 Las Vegas What is big data? Big data is
More informationThe UK Concept of Base Cost Shift
The UK Concept of Base Cost Shift Jenny Wheater February 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and Affiliate
More informationU.S. ERISA QPAM Exemption
U.S. ERISA QPAM Exemption Lawrence Davidson June 204 204 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and Affiliate Offices New
More informationInvestment Company Act of 1940 Private Funds
Investment Company Act of 1940 Private Funds David A. Sussman Steven J. Gray March 2016 2016 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane
More informationInvestment Advisers Act of 1940
Investment Advisers Act of 1940 Robert Bramnik August 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and Affiliate Offices
More informationPrivate Equity Fund Expenses
Private Equity Fund Expenses Barry Steinman Fall 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and Affiliate Offices
More informationFATCA & Beyond - Global Information Sharing and Private Equity Funds
FATCA & Beyond - Global Information Sharing and Private Equity Funds Jenny Wheater August 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP.
More informationTransfer of Limited Partnership Interests
Transfer of Limited Partnership Interests Thomas Redekopp February 2015 2015 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and
More informationConstruction Contract Law Issues for Major Water Infrastructure Projects
Construction Contract Law Issues for Major Water Infrastructure Projects Presented by Antony L. Sanacory to: (asanacory@duanemorris.com) 2013 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered
More informationPrivate Equity Fund Fees Barry Steinman August 2014
Private Equity Fund Fees Barry Steinman August 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm and Affiliate Offices New
More informationPrivate Equity Funds Clawbacks and Investor Givebacks
Private Equity Funds Clawbacks and Investor Givebacks Linda Zeman & David Sussman August 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP.
More informationPrivate Equity Fund Distribution Waterfalls
Private Equity Fund Distribution Waterfalls David Sussman & Linda Zeman June 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris
More informationUS Tax Issues for Foreign Partners: US Withholding Taxes & Tax Treaties
US Tax Issues for Foreign Partners: US Withholding Taxes & Tax Treaties Hope P. Krebs January 2015 2015 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris
More informationINVESTMENT IN WIND ENERGY IN VIETNAM: THE RIGHT TIME HAS COME?
INVESTMENT IN WIND ENERGY IN VIETNAM: THE RIGHT TIME HAS COME? OLIVER MASSMANN MANAGING PARTNER DUANE MORRIS VIETNAM LLC 2010 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service
More informationWIND PROJECT DEVELOPMENT : BUSINESS OPPORTUNITIES AND SUITABLE BUSINESS MODELS FOR VIETNAM
WIND PROJECT DEVELOPMENT : BUSINESS OPPORTUNITIES AND SUITABLE BUSINESS MODELS FOR VIETNAM OLIVER MASSMANN MANAGING PARTNER DUANE MORRIS VIETNAM LLC 2010 Duane Morris LLP. All Rights Reserved. Duane Morris
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationLEGAL TRAPS IN ENERGY CONTRACTS, PERFORMANCE CONTRACTING AND NYC ENERGY CONSERVATION LAW for Association of Energy Engineers New York City Chapter
LEGAL TRAPS IN ENERGY CONTRACTS, PERFORMANCE CONTRACTING AND NYC ENERGY CONSERVATION LAW for Association of Energy Engineers New York City Chapter presented by Phyllis Kessler, Esq. and Peter Funk, Esq.
More informationCertain Investor Tax Considerations for Investing in U.S. Funds David Sussman August 2014
Certain Investor Tax Considerations for Investing in U.S. Funds David Sussman August 2014 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane
More informationPrivate Equity Fund Formation Conflicts of Interest
Private Equity Fund Formation Conflicts of Interest Jonathan Cohen January 2015 2014 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris Firm
More informationDUANE MORRIS IMMIGRATION PRACTICE
THE DUANE MORRIS IMMIGRATION PRACTICE www.duanemorris.com Duane Morris Firm and Affiliate Offices New York London Singapore Philadelphia Chicago Washington, D.C. San Francisco Silicon Valley San Diego
More informationHacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows
Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows 24 February 2015 Callum Sinclair Faith Jayne Agenda Top 10 legal need-to-knows, including: What is cyber
More informationCYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationCyber security: A major issue for Australian business
Cyber Security: A major issue for Australian business: February 2016 1 Cyber security: A major issue for Australian business Contents Introduction and background Is your industry particularly vulnerable
More informationCyber-Security Risk in the Global Organization:
Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three
More informationCloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC
Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC Disclaimer THIS PRESENTATION IS TO ASSIST IN A GENERAL
More informationHOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU
HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU 10 April 2014 Monica Salgado Advogada registered with the Portuguese Ordem dos Advogados Registered European Lawyer with the SRA Kirsti Laird Solicitor, (qualified
More informationLiberating the Power of Service The right of establishment The case of lawyers
Liberating the Power of Service The right of establishment The case of lawyers Second Bruges European Business Conference College of Europe Jacques Derenne, Partner, Hogan Lovells, Brussels Associate Professor,
More informationLiberating the Power of Service The right of establishment The case of lawyers. Second Bruges European Business Conference College of Europe
Liberating the Power of Service The right of establishment The case of lawyers Second Bruges European Business Conference College of Europe Jacques Derenne, Partner, Hogan Lovells, Brussels Associate Professor,
More informationBig Data for Mutuals. Marc Dautlich 25 November 2013
Big Data for Mutuals Marc Dautlich 25 November 2013 Agenda BIG DATA What is it? OPPORTUNITIES What are they? LEGAL CHALLENGES How do we overcome them? LEGAL REFORM What can we do now to minimise impact?
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationSecurity breach! A closer look from a data protection law perspective November 2014 Gabriel Voisin (Associate)
Security breach! A closer look from a data protection law perspective November 2014 Gabriel Voisin (Associate) Why is this a challenge? When personal data is compromised, mandatory or recommended notification
More informationIs Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014
Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Cyber Exposures Joan D Ambrosio Reported data breaches continue
More informationCrossing Borders New Guidance on the Transfer of Personal Data outside Hong Kong
Legal Update Privacy & Security Hong Kong 20 January 2015 Crossing Borders New Guidance on the Transfer of Personal Data outside Hong Kong Section 33 of the Hong Kong Personal Data (Privacy) Ordinance
More informationCyber Security : preventing and mitigating incidents. Alexander Brown Robert Allen
Cyber Security : preventing and mitigating incidents Alexander Brown Robert Allen 07 & 08 October 2015 Cyber Security context of the threat The magnitude and tempo of [cyber security attacks], basic or
More informationCYBER-ATTACKS THE GLOBAL RESPONSE
R E P R I N T CYBER-ATTACKS THE GLOBAL RESPONSE REPRINTED FROM: Risk, Governance & Compliance for Financial Institutions 2015 RISK GOVERNANCE & COMPLIANCE for F I N A N C I A L INSTITUTIONS 2 0 1 5 Visit
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More information01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte
More informationCYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
More informationCYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO
CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBER, INFORMATION SECURITY - OVERVIEW A cyber security breach is no longer just an
More informationPCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES
PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES Cyber Attacks: How prepared are you? With barely a day passing without a reported breach of corporate information security, the threat to financial
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationCorporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
More informationTelecommunications / Real Estate
Telecommunications / Real Estate December 2007 ALBANY AMSTERDAM ATLANTA BOCA RATON BOSTON CHICAGO DALLAS DELAWARE DENVER FORT LAUDERDALE HOUSTON LAS VEGAS LOS ANGELES MIAMI NEW JERSEY NEW YORK ORANGE COUNTY
More informationCYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
More informationData Breach Trends October 2015
Data Breach Trends October 2015 Introduction In October 2015 the Information Commissioner s Office (ICO) published the latest data breach trends including incidents by quarter, type of incident and incidents
More informationCyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationThe era of hacks and cyber regulation
6 February 2014 The era of hacks and cyber regulation We trust that you are well versed with the details of the various cyber-attacks that made the headlines towards the end of 2014, and early this year,
More informationOn the edge Lexis PSL Restructuring & Insolvency
On the edge Lexis PSL Restructuring & Insolvency Data protection law for insolvency practitioners November 2014 Welcome to your third edition of On the edge, a series of guides highlighting a selection
More informationThe Data Protection Landscape. Before and after GDPR: General Data Protection Regulation
The Data Protection Landscape Before and after GDPR: General Data Protection Regulation Data Protection regulations across Europe Current regulations & guidance European Directives 95/46/EC (Data Protection)
More informationEveryone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session
Everyone in the workplace has a legal duty to protect the privacy of information about individuals AEP/BELB/LJ/2010 Awareness Session During 2007 alone, 36,989,300 people in the UK have had their private
More informationA Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014
A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More informationDATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
More informationTracking Compliance: Data Protection Risks and Remedies for Retail Janine Regan. charlesrussellspeechlys.com
Tracking Compliance: Data Protection Risks and Remedies for Retail Janine Regan charlesrussellspeechlys.com Janine Regan Associate +44 (0)20 7427 6798 janine.regan@crsblaw.com Janine has extensive experience
More informationData breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
More information2014 Employment Law Update South Central Industrial Association. November 6, 2014 Houma, Louisiana
2014 Employment Law Update South Central Industrial Association November 6, 2014 Houma, Louisiana Which is Riskier? Hiring Criminals or Conducting Background Checks? Presented by: Timothy H. Scott Phone:
More informationWho s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
More informationThompson Jenner LLP Last revised April 2013 Standard Terms of Business
The following standard terms of business apply to all engagements accepted by Thompson Jenner LLP. All work carried out is subject to these terms except where changes are expressly agreed in writing. 1
More informationCyber Risk Management
Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also
More informationJUDGMENT ON THE SPANISH TAX LEASE SYSTEM
JUDGMENT ON THE SPANISH TAX LEASE SYSTEM CASE T-719/13 PYMAR / COMMISSION Contents 1. Background 2. Judgment of the GCEU of 17 December 2015 in Case T- 719/13, PYMAR / Commission 3. Effects of the Judgment
More informationQBE Trade Credit Trade Credit Insurance proposal form
QBE Trade Credit Trade Credit Insurance proposal form QBE European Operations Please read the following information carefully This document sets out the important information that you, or your insurance
More informationOUTSOURCING, HOSTING AND DATA PRIVACY ISSUES
OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES 4 April 2013 James Castro-Edwards Solicitor Monica Salgado Advogada / Portuguese Lawyer OUR TEAM Speechly Bircham is an ambitious, full-service law firm with
More informationData Protection Avoiding Information Commissioner Fines. Caroline Egan 5 June 2014
Data Protection Avoiding Information Commissioner Fines Caroline Egan 5 June 2014 Why is data protection a hot topic in pensions? Pension schemes hold large amounts of personal data Individuals more aware
More informationMANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
More informationPrivacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
More informationCybersecurity Risk Factors: Five Tips to Consider When Any Public Company Might be The Next Target
10 February 2014 Practice Groups: Capital Markets Insurance Coverage The text of this article was first published by Law360 on February 10, 2014. Cybersecurity Risk Factors: Five Tips to Consider When
More informationDefining and Managing Reputation Risk
BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Defining and Managing Reputation
More informationDemystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
More informationFirm Registration Form
Firm Registration Form Firm Registration Form This registration form should be completed by firms who are authorised and regulated by the Financial Conduct Authority. All sections of this form are mandatory.
More informationDuane Morris LLP. locations. Duane Morris LLP 30 S 17th Street Philadelphia, PA 19103 Phone: (215) 979-1000 www.duanemorris.com
30 S 17th Street Philadelphia, PA 19103 Phone: (215) 979-1000 www.duanemorris.com locations Atlanta, GA Baltimore, MD Boca Raton, FL Boston, MA Cherry Hill, NJ Chicago, IL Houston, TX Lake Tahoe, CA Las
More information2014 Employment Law Update South Central Industrial Association. November 6, 2014 Houma, Louisiana
2014 Employment Law Update South Central Industrial Association November 6, 2014 Houma, Louisiana If A Stripper Is Not An Independent Contractor, Who Is? Presented by: Steven R. Cupp Phone: (228) 822-1440
More informationCyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
More informationWireless (In)Security Trends in the Enterprise
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc. All rights reserved. WiFi is proliferating fast.
More informationData controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
More informationPENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
More informationEU Competition Law. Article 101 and Article 102. January 2010. Contents
EU Competition Law January 2010 Contents Article 101 The requirements of Article 101(1) Exemptions under Article 101(3) Article 102 Dominant position Abuse of a dominant position Procedural issues Competition
More informationCyber Defense & Breach Response Privacy Issues
Cyber Defense & Breach Response Privacy Issues Kevin Boyle Partner 17 November 2014 Latham & Watkins is the business name of Latham & Watkins (London) LLP, a registered limited liability partnership organised
More informationInformation Disclosure on the Securities Market
3 Legal Update Banking & Finance Construction & Engineering Corporate & Securities Vietnam 06 July 2012 Information Disclosure on the Securities Market Summary On 5 April 2012, the Ministry of Finance
More informationData Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
More informationThe Cloud and Cross-Border Risks - Singapore
The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in
More informationMaritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
More informationData, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller
Data, Privacy, Cookies and the FTC in 2013 Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller BIOS Kevin Stark: Product Manager at ExactTarget. Focused on data security,
More informationEnvironment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures
Environment, Health And Safety Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures WHAT IS THE THREAT TO YOUR COMPANY S COMPLIANCE RECORD AND GOOD
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationHow Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks?
September 29, 2015 Practice Groups: Regulatory Compliance Internal Investigations Government Investigations White Collar Crime/Criminal Defense Public Policy and Law Environmental, Land and Natural Resources
More informationBusiness Interruption Factsheet
Business Interruption Factsheet Business Interruption (BI) should be an essential part of your business insurance protection to provide cover against both loss of income and additional expenses you incur
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationInsurance Coverage for Green Building: CGL, E&O and Property Anticipating Liabilities and Coverage Risks in Sustainable Building
presents Insurance Coverage for Green Building: CGL, E&O and Property Anticipating Liabilities and Coverage Risks in Sustainable Building A Live 90-Minute Teleconference/Webinar with Interactive Q&A Today's
More informationHow To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
More informationAfter the Event Insurance and Funding Solutions in International Arbitration
International Arbitration Webinar, 5 April 2011 After the Event Insurance and Funding Solutions in International Arbitration Peter Morton, K&L Gates LLP James Blick, The Judge Limited Neil Purslow, Therium
More informationTheft, Fraud & Dishonest Employees. An Employee Fraud Case Study. Presented by Jon Coley, Partner, Employment
Theft, Fraud & Dishonest Employees An Employee Fraud Case Study Presented by Jon Coley, Partner, Employment Case Study, Part 1 Brenda is a Deputy Finance Manager in the finance team covering holiday for
More informationWhy is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP
Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA, LLP Created as a collaborative effort between government and industry to ensure every American has the resources they need to stay
More informationSEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers. November 12, 2010
SEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers November 12, 2010 The Securities and Exchange Commission (SEC) has proposed rules to implement
More informationMANAGING CYBERSECURITY INVESTIGATIONS
MANAGING CYBERSECURITY INVESTIGATIONS Tara Swaminatha, Of Counsel, Washington, DC Sam Millar, Partner, London May 12, 2016 If you cannot hear us speaking, please make sure you have called into the teleconference
More informationFinancial services regulation in Australia
Financial services regulation in Australia FEBRUARY What you need to know Financial services regulation in Australia February 2016 1 What you need to know Key points Do you do business in Australia or
More informationData Protection and Cloud Computing: an Overview of the Legal Issues
Data Protection and Cloud Computing: an Overview of the Legal Issues Christopher Kuner Partner, Hunton & Williams, Brussels Research Assistant, University of Copenhagen Nordic IT Law Conference Copenhagen,
More informationCyber Security: Protecting your business survey stats
Cyber Security: Protecting your business survey stats Researched and authorised by Pitmans LLP in partnership with techuk. Report prepared in January 2014 by Philip James, Partner and Rob Jarrett, Solicitor.
More informationBRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
More information