Touring the World of Cybersecurity Law
|
|
|
- Benjamin Terry
- 9 years ago
- Views:
Transcription
1 SESSION ID: MODERATOR: LAW W04 Touring the World of Cybersecurity Law Alan Charles Raul PANELISTS: John Smith Vice President, Legal Cybersecurity & Privacy Raytheon Michael Sulmeyer Director, Cyber Security Project Belfer Center for Science and International Affairs Harvard Kennedy School of Government Partner Sidley Austin LLP Datamatters.sidley.com
2 Overview and How to Apply Today s Discussion Introduction International Law & Policy National Law Panel Discussion Analysis Application Q & A 2
3 Introduction Why governance of cyberspace is different and hard and fascinating! Cyberspace's reach across geo political boundaries defies traditional governance. Who has authority to make the law? What is the applicable law? Who has the power to enforce it? Co dependency of public and private sectors: gov t duty, but mostly private assets Different sets of rules to protect systems and data types Critical Infrastructure Proprietary Information Personal Data Challenges of anonymity and attribution 3
4 International Law & Policy 4
5 Council of Europe Cybercrime Convention No single international framework for cybersecurity law, but some multi lateral efforts Budapest Convention on Cybercrime (2001) Council of Europe s effort to harmonize disparate national cybercrime laws. Signatories promise to: Adopt domestic legislation to establish procedures outlined in treaty (e.g., expedited preservation, search and seizure, interception of computer data). Cooperate through mutual legal assistance (MLA) even if no more specific agreement (e.g., extradition, accessing computer data, interception). Prosecute cyber crimes committed on its territory 5
6 EU Cybersecurity Framework EU Network and Information Security (NIS) Directive In January 2016, EU Parliament approved NIS Directive, proposed in 2013 EU Cyber Security Strategy. Expect formal approval by Council of Ministers, then EU countries must implement into national law within 21 months. PRIVACY Proposed EU General Data Protection Regulation Extraterritorial Application and Enforcement. New law would apply to any company that controls or processes the personal data of Europeans through the offering of goods and services even if company has no physical presence in Europe. Fines of up to 4% of company s annual global revenue or 20 million for violations 6
7 National Cybersecurity Law 7
8 United States Cybersecurity Law Cybersecurity legal parameters arise from multiple layers and sources. Federal law Computer Fraud and Abuse Act prohibits unauthorized computer access, interference, obtaining data Electronic Communications Privacy Act governs interception, access to data State law fills gaps in federal law, but can set de facto national standards Example: Massachusetts data breach requirement triggered by a (1) substantial risk of identity theft or fraud (2) OR acquisition or use for an unauthorized purpose Companies handling sensitive personal data must have Written Information Security Policy; encryption of personal data transmitted externally; and specific minimum administrative, technical, and physical security controls. 8
9 U.S. Cybersecurity Law Critical Infrastructure and Information Sharing Enhancing cybersecurity for critical infrastructure has been a key focus of the Obama administration. February 2013: Executive Order Identifies 16 critical infrastructure areas Regulators directed to review existing authorities and act to improve cybersecurity among regulated entities February 2014: NIST releases Cybersecurity Framework and CI Cyber Community ( C³ ) Cybersecurity Act of 2015: Information Sharing through DHS Portal. Establishes a voluntary framework for confidential, two way sharing of cyber threat information between private sector and U.S. government, via a Department of Homeland Security portal; offers protection from liability for sharing. 9
10 U.S. Cybersecurity Law Protecting Personal Information Companies have generally applicable legal obligations to protect personal information. Data Security: Massachusetts data security law requires specific affirmative acts Data Breach Notification: State laws generally require alerts to state regulators and impacted individuals if breach involving personal data. Companies may not make deceptive data security claims or engage in unfair data security practices. Policed by Federal Trade Commission and state regulators. In certain sectors, specific laws impose additional layer of security duties for certain categories of sensitive personal data. Financial Services: Gramm Leach Bliley Act (Nonpublic Personal Information, NPI ) Healthcare: HIPAA (Protected Health Information, PHI and ephi ) Telecommunications Carriers: Communications Act (Customer Proprietary Network Information, CPNI ) 10
11 Canada Cybersecurity Law Criminal Code Prohibits fraudulently and without color of right obtaining any computer service; or willful mischief to interfere with computer use or tamper with data. Prohibits interception, access to electronic communications, but exceptions for consent ( express or implied ) or to protect the network. Personal Information Protection & Electronic Documents Act (PIPEDA) (2005) Reasonable administrative, technical, physical measures to protect personal data. Enforcement Entities: Office of the Privacy Commissioner of Canada enforces PIPEDA Risk: high degree of privacy enforcement, deemed adequate country by EU 11
12 United Kingdom Cybersecurity Law Computer Misuse Act of 1990 (Amended in 2006) Prohibits hacking, unauthorised access to computer systems, and purposefully spreading malware. Enforcement UK ICO can issue an Enforcement Notice for breach of the data protection principles in the UK Data Protection Act of (This will change GDPR in 2018.) Staysure.com.uk (2015): Fine of 175,000 on holiday insurance company for inadequate security systems and policy, causing breach of credit card data of 90,000+ customers Worldview Limited (2014): Fine of 7,500 for vulnerability in company s website, enabling hackers to access payment card data of 3,500+ customers 12
13 French Cybersecurity Law French Data Protection Act Omnibus privacy, data protection, and cybersecurity framework law Enforcement In May 2015, the CNIL issued a summary of its inspection program for : CNIL conducted 421 inspections 2015: CNIL planned to conduct 550 inspections Optical Center (2015): Fined 50,000 by the CNIL for inadequate security of customers personal data (vulnerable customer login site, weak passwords). 13
14 German Cybersecurity Law Federal Data Protection Act (BDSG) IT Security Act (ITSG) (2015) critical infrastructure operators must: Establish and Implement a minimum set of security measures; Verify implementation by conducting security audits; Report incidents to Federal Office for Information Security (BSI). Telecommunications Act (2014) contains sector specific data security provisions. For example, section 109 requires the use of technical safeguards to prevent unauthorized access. Enforcement: Improper Data Processing Agreement (Bavarian DPA, 2015) Imposed big fine on data controller for failure to adequately specify security controls to protect personal data in agreement with data processor. 14
15 Estonian Cybersecurity Law National Department of Critical Infrastructure Protection Coordinates IT security for 42 critical public and private services Estonian Information Systems Authority (EISA) Assists and supervises public and private sector organizations with IT security. Responsible for encryption of electronic IDs issued to Estonian citizens and businesses. Data Protection Inspectorate Allows the public to request info about collection of personal data; promotes transparency of institutions performing public functions. National CERT (CERT EE) Handles security incidents on the.ee domain (denial of service attacks, malware) 15
16 Chinese Cybersecurity Law No comprehensive cybersecurity law Draft Cybersecurity Law (July 2015) would consolidate existing powers, including monitoring, and introduces concept of Critical Information Infrastructure Antiterrorism Law (effective January 2016) Requires telecom operators and Internet companies to provide technical interfaces, decryption and other technical support and assistance to China s government investigating terrorist activities, broadly defined. Omits controversial draft language requiring data localization and encryption key registration by foreign tech companies. National Security Law (July 2015) Government to ensure that key technologies and infrastructure, as well as information systems and data in important areas, are safe and controllable, so as to protect national sovereignty, security and development interests in the cyberspace. Computer Information Network and Internet Security, Protection, and Management Regulations Internet service providers must secure processing of data, educate Internet users on security. 16
17 Japanese Cybersecurity Law Criminal Code, and Act on the Prohibition of Unauthorized Computer Access (UCAL): Prohibit computer fraud, malware, spyware, obstructing business by interfering, false data, unauthorized computer access. Act on the Protection of Personal Information (APPI): duty of companies to secure personal data they handle Enforcement Entities: NO central data protection authority in Japan. APPI enforced by the ministry responsible for oversight of the sector containing the company at issue Risk: High risk if violations of Criminal Code, or UCAL Moderate risk if privacy violations When relevant ministry learns of a company s violation, ministry first contacts company informally to discuss problem, changes. Low risk of formal enforcement, unless fail to implement those changes. Benesse (2014): after, breach affected 35 million customers, the Ministry of Economy, Trade, and Industry directed company to change contracts with subs and own management and security controls. 17
18 South Korean Cybersecurity Law Act on the Protection of Information and Communications Infrastructure Information and Communications Network Act detailed security standards for service providers Personal Information Protection Act (PIPA) One of strictest privacy regimes in world: breach damages awarded up to 3x actual harm claimed Imposes security requirements on entities handling personal data Breach Notification Required PIPA and sectoral statutes require prompt notice of personal data breach to individuals and regulators Enforcement Risk: high if privacy violations Google (2014): Fined ~$200K for harvesting sensitive personal data from wi fi networks w/o consent 18
19 Indian Cybersecurity Law India s Information Technology Act of 2000 (IT Act) addresses the protection of electronic data and computer related offenses (e.g., hacking and tampering with computer source documents) Under 2008 amendments, IT Act does not criminalize hacking, but prohibits computerrelated fraud and tampering with computer source documents. Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules Privacy Rules Together, IT Act and Privacy Rules impose cyber requirements on companies. Reasonable Security Practices interpreted as operation of documented, comprehensive information security program, policies, and procedures Parties can specify reasonable security practices in contract. 19
20 Singapore Cybersecurity Law Computer Misuse and Cybersecurity Act governs cybercrime. Unauthorized access to or modification of computer material; Unauthorized use or interception of a computer service; 2013 Amendments address cyber threats to critical information infrastructure Minister of Home Affairs can direct companies to take pre emptive measures necessary to prevent, detect, or counter any cyber threat to national security, essential services, or foreign relations of Singapore. Personal Data Protection Act 2012 is Singapore s first comprehensive framework for personal data protection. Individuals and organizations must protect personal data with reasonable security arrangements to prevent unauthorized access or similar risks. 20
21 Australia Cybersecurity Law Telecommunications (Interception and Access) Act 1979 May intercept data if one party consents OR if owner performing network security and informs employees Employer may monitor employee s personal data too, if sufficient nexus to EE record/relationship +inform employees Privacy Act 1998 (amended 2014) Exemption for employer actions directly connected to employee record/relationship Reasonable steps to protect personal data (data breach policy, incident response plan) No general data breach notice mandate, but is required in health and financial sectors Enforcement Entities: Australian Information Commissioner and the Privacy Commissioner Makes determinations on alleged breaches of Privacy Act, enforceable by court Risk: higher since 2014, new power for Privacy Commissioner: penalties, enforceable order Maximum civil penalty for privacy violations: AU$ 1.7 million for companies Adobe (2015): AIC found Adobe s handling of customer password hints violated Privacy Act; recommended security changes 21
22 UAE Cybersecurity Law Cyber Crimes Law: 2012 Amendments expand scope of offenses, definition of privacy violations and monetary penalties and punishment Offenses: Strict liability standard for unauthorized access to electronic sites and information; no intent required. Penalties: Increase with perceived sensitivity of data accessed or disclosed. Many violations entail imprisonment or deportation. No comprehensive data protection law Telecommunications Regulatory Authority Oversees telecommunications, information technology, and Internet regulation National CERT (aecert) Provides incident response support and cybersecurity awareness training 22
23 Panel Discussion 23
24 Analysis: Tensions in Global Cyberspace The rapid growth of the Internet and sophistication of cybercrime continues to outpace the ability of the legal system to respond. The attribution problem makes policing and accountability particularly difficult. Cyber assets are distributed between the public sector and private sector, and the private sector is comprised of a wide range of disparate entities. There is a lack of international coordination on cyber issues. As a result, there is no centralized international cyber threat information sharing or common computer incident response teams. Different values among countries; different levels of preparedness; different degrees of interest and risks. Companies and governments face overlapping and conflicting sets of laws: Harmonization vs. divergence of regional and national laws Personal data laws and system/infrastructure obligations are not integrated or reconciled Quality of company's cybersecurity depends in part on visibility into traffic on its own network, but such insight can be in tension with cultural and sometimes legal barriers to electronic monitoring of employees. Approach to implementation: market driven vs. regulatory Governance: government centric vs. multi stakeholder 24
25 Analysis: Regionalism in Law and Policy Prominence of regionalism reflected in emergence of international and regional cybersecurity instruments Instruments developed in the context of, or inspired by: Council of Europe or the European Union Commonwealth of Independent States or the Shanghai Cooperation Organization intergovernmental African organizations League of Arab States United Nations Substantial cross fertilization exists among all instruments Example: concepts in the Budapest Convention on Cybercrime by Council of Europe. Trend: regional and national incorporation of treaty based cybersecurity legal regimes 25
26 Applying What You ve Learned Next week, you should: Meet your cyber lawyer; begin talking about legal aspects of managing cyber risks Begin identifying and mapping regional, national, and sub national cyber legal rules, wherever you do business In the next 6 months, you should: Conduct a cyber legal assessment to determine vulnerabilities, risks, and resources Develop, update, and maintain written policies and procedures, including on governance by Board of Directors. Identify the cybersecurity tools and services used by your company; learn how they work and handle data; and then analyze them against current law in each jurisdiction where your company uses them. Before next year s RSA conference, you should: Develop and maintain cybersecurity training programs for employees and contractors Deploy information security safeguards for vendors/service providers, including reporting and due diligence Regularly test and update all assessments, safeguards, and protocols 26
27 Q&A Questions and Answers 27
CYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
Information Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised
Standards of. Conduct. Important Phone Number for Reporting Violations
Standards of Conduct It is the policy of Security Health Plan that all its business be conducted honestly, ethically, and with integrity. Security Health Plan s relationships with members, hospitals, clinics,
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
What are you trying to secure against Cyber Attack?
Cybersecurity Legal Landscape Bonnie Harrington Executive Counsel EHS and Product Safety & Cybersecurity GE Energy Management Imagination at work. What are you trying to secure against Cyber Attack? Personally
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
Dealing with data breaches in Europe and beyond
Dealing with data breaches in Europe and beyond Karin Retzer and Joanna Łopatowska Morrison & Foerster LLP www.practicallaw.com/6-505-9638 The use of increasingly advanced technology means that the ways
The Cloud and Cross-Border Risks - Singapore
The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Australia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: [email protected] Australia
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
The Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
Getting Serious about Privacy and Cyber Security in Asia Pacific
SESSION ID: CDS-F04 Getting Serious about Privacy and Cyber Security in Asia Pacific Scott Thiel Partner DLA Piper @DLA_Piper Peter Jones Partner DLA Piper @DLA_Piper Agenda Current threat environment
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff [email protected] What Is Information Privacy? Your name? Your phone number or home address? Your email address?
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
T-CY Guidance Note #4 Identity theft and phishing in relation to fraud
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?
HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? 1 DEFINITIONS HIPAA Health Insurance Portability and Accountability Act of 1996 Primarily designed
HIPAA and Mental Health Privacy:
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Data and Cyber Laws Up-date 9 July 2015
Data and Cyber Laws Up-date 9 July 2015 Janine Regan Alexia Zuber Viktoria Protokova Simon Holdsworth charlesrussellspeechlys.com Topics Updates on the key aspects of, and commentary on, the proposed GDPR
Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications
Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Varun Badhwar Co-Founder; VP of Products & Solution Engineering 1 2013 CipherCloud All rights reserved. Agenda Introduction
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA ON THE AMENDMENT OF THE ORDER NO. 1V-1013 ON THE APPROVAL OF THE RULES ON THE ENSURANCE OF SECURITY AND INTEGRITY
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
Taking a Data-Centric Approach to Security in the Cloud
Taking a Data-Centric Approach to Security in the Cloud Bob West Chief Trust Officer CipherCloud 2014 CipherCloud All rights reserved 1 Taking a Data-Centric Approach to Cloud Data Protection Bob West
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.
Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
HIPAA DATA SECURITY & PRIVACY COMPLIANCE
HIPAA DATA SECURITY & PRIVACY COMPLIANCE This paper explores how isheriff Cloud Security enables organizations to meet HIPAA compliance requirements with technology and real-time data identification. Learn
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
DATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013
Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
Somansa Data Security and Regulatory Compliance for Healthcare
Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances,
HIPAA The Law Explained. Click here to view the HIPAA information.
HIPAA The Law Explained Click here to view the HIPAA information. HIPAA - Provisions 5 Major Provisions/Titles Title 1 Title 2 Title 3 Title 4 Title 5 More Information on Administrative Simplification
Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
HIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
Conducting due diligence and managing cybersecurity in medical technology investments
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and
12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
