Roxio Secure Solutions for Law Firms



Similar documents
Securing Data on Portable Media.

H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

COMPLIANCE ALERT 10-12

CYBER RISK MANAGEMENT IN THE BOATING INDUSTRY

Introduction to the Technology Guidance for Executives Practice Area

Solutions Brief. PC Encryption Regulatory Compliance. Meeting Statutes for Personal Information Privacy. Gerald Hopkins Cam Roberson

The Impact of HIPAA and HITECH

SENATE FILE NO. SF0065. Sponsored by: Senator(s) Johnson and Case A BILL. for. AN ACT relating to consumer protection; providing for

Privacy Legislation and Industry Security Standards

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA Richmond, Virginia Tel. (617) Tel. (804)

January An Overview of U.S. Security Breach Statutes

Virginia Commonwealth University School of Medicine Information Security Standard

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

Information Technology Services Guidelines

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Approved By: Agency Name Management

Policies and Procedures. Policy on the Use of Portable Storage Devices

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Data Security Breach Notice Letter

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Data Breach Readiness

Comparison of US State and Federal Security Breach Notification Laws. Current through August 26, 2015

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

Designation of employee(s) in charge of the program; Identifying and assessing risks/threats and evaluating and improving

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments

Overview of the HIPAA Security Rule

KRS Chapter 61. Personal Information Security and Breach Investigations

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Secure File Sharing for HIPAA Compliance: Protecting PHI

The HITECH Act: Protect Patients and Your Reputation

Cloudy With a Chance Of Risk Management

10 Backing Up Windows 7

M E M O R A N D U M. Definitions

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

Information Security and Privacy. WHAT are the Guidelines? HOW is it to be done? WHY is it done?

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

SecureD Technical Overview

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

DRAFT Template: Health Information Privacy and Security Breach Notification Letter

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Kaspersky Lab s Full Disk Encryption Technology

CSR Breach Reporting Service Frequently Asked Questions

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Page 1. Copyright MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

Five Rivers Medical Center, Inc Medical Center Drive Pocahontas, AR Notification of Security Breach Policy

HIPAA Privacy Breach Notification Regulations

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

HIPAA BREACH NOTIFICATION REQUIREMENTS. Heman A. Marshall, III July 25, 2014

Privacy and Data Security Update for Defense Contractors

BUSINESS ASSOCIATE AGREEMENT

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

BUSINESS ASSOCIATE AGREEMENT

Data Access Policy for Members of the Public (Minnesota Statutes, section 13.03, subdivision 2)

BUSINESS ASSOCIATE AGREEMENT

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

HIPAA BUSINESS ASSOCIATE AGREEMENT


Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

BUSINESS ASSOCIATE AGREEMENT ( BAA )

Business Associate Agreement

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Guidance on the Use of Portable Storage Devices 1

Procedure for Managing a Privacy Breach

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

Disclaimer: Template Business Associate Agreement (45 C.F.R )

MOBILE DEVICE SECURITY POLICY

HIPAA 101. March 18, 2015 Webinar

HIPAA Business Associate Addendum

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Data Security and Privacy Policy

Transcription:

Roxio Secure Solutions for Law Firms Law firms can easily protect sensitive data stored on CD, DVD, Blu-ray Disc and USB flash media with Roxio Secure Solutions

Introduction Law firms and their clients commonly store and exchange data on removable media including CDs, DVDs, Blu-ray Discs and USB flash memory devices. Copying, archiving and exchanging data on portable media is a key process in today s business environment. This data is often confidential, and may include client records, internal eyes only legal briefs, and other sensitive information. However, portable media can easily be lost or stolen. Therefore, it is critical that data stored on this media is protected through encryption. Roxio Secure is a product line that manages the encryption of data on removable media including optical discs and USB flash memory devices. Roxio Secure makes it easy for employees to automatically encrypt data, and helps to protect law firms from the expense of data breach and non-compliance with mandated regulations. Data Breach A Major Problem Data breach has become a major problem for businesses and organizations. A Google news search for data breach provides a quick glimpse into the prevalence and costs of data breaches. According to a recent study by Poneman Institute, the costs of data breach exceed $200 per customer record lost and continue to grow year by year. 1 According to Ellen Messmer, Senior Editor at Network World, the, Poneman Institute looks at several factors including: the cost of lost business because of an incident; legal fees; disclosure expenses related to customer contact and public response; consulting help; and remediation expenses such as technology and training. 2 Law firms have both ethical and legal responsibilities to protect confidential client data. Furthermore, law firms must protect internal data such as employee records. In particular, attorneys are concerned with protecting personally identifiable information (PII) about individuals. Encryption is a key tool to prevent unwanted access to this data. According to the National Conference of State Legislatures, forty-six states, the District of Columbia, Puerto Rico and the Virgin Islands have enacted legislation requiring notification of security breaches involving personal information. 3 Notification can be expensive and can damage a firm s reputation. As a specific example, California Senate Bill 1386 requires that affected individuals must be notified if unencrypted personal information is acquired by an unauthorized person. SEC. 2. Section 1798.29 is added to the Civil Code, to read: 1798.29. (a) Any agency that owns or licenses computerized data that includes personal information shall disclose any 1 2009 Study: Cost of a Data Breach by Poneman Institute: http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/us_ponemon_codb_09_012209_sec.pdf 2 Ellen Messmer, N. W. (n.d.). Data Breach Costs Top $200 per Customer Record. Retrieved from http://www.networkworld.com/news/2010/012510-data-breach-costs.html 3 http://www.ncsl.org/issuesresearch/telecommunicationsinformationtechnology/securitybreachnotificationlaws /tabid/13489/default.aspx

breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subdivision (c), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. 4 Encrypting the data law firms store on portable media can save a firm from the substantial costs and loss of reputation associated with a security breach. The Challenge of Protecting Data In the simplest terms, encryption of data on portable media can prevent unauthorized users from accessing it. The encryption needs to be strong enough to prevent circumvention and some organizations must also comply with specific encryption standards such as US government approved standards. One of the biggest challenges in protecting data on removable media is that it is so easy for employees to write unprotected files to an optical disc or to a USB stick. Even if encryption is available, employees may simply choose not to use it because it requires extra time and effort. Roxio Secure solutions are specifically designed to make it extremely easy to secure data on removable media. Furthermore, Roxio Secure solutions are designed to be scalable, depending on the needs of the organization. Encryption can be controlled by the user, or by the system administrator at the user, workgroup or organizational level based on policy. With Roxio Secure, business decision makers as well as employees responsible for transporting data can be confident that the data they carry is encrypted and secure. The Roxio Secure Product Line Roxio Secure products consist of an end-user friendly family of enterprise applications that help to protect against data breach. The products enable users within an organization to quickly secure data on CD, DVD, Blu-ray Disc and flash devices using powerful data encryption that safeguards the contents from being accessed by unauthorized persons. Roxio Secure offerings go beyond simple encryption on stand-alone machines to provide advanced end-point security features for networks of computers in small workgroups to multi-departmental global enterprises. Roxio Secure offerings arm companies with the tools to not only meet internal security policies, but also comply with industry and government-mandated privacy measures and regulations. Roxio Secure Burn includes: Burns data on CD, DVD and Blu-ray Disc using an easy drag & drop interface Copies discs and disc image files Encrypts data on disc using a FIPS 140-2 certified encryption module 4 http://info.sen.ca.gov/pub/01-02/bill/sen/sb_1351-1400/sb_1386_bill_20020926_chaptered.html

Spans files too big to fit across multiple discs Reads and writes disc image files Roxio Secure Burn Plus adds: Discs can be read on PCs within permitted departmental groups of PCs Restricts permission to read discs on PCs outside permitted departmental groups Group read permissions are set at installation via command line Read permissions can be changed after installation with the included Roxio Permissions Manager applet Roxio Secure Managed adds: Discs can only be written by permitted users Discs can only be read by permitted users An authorization server controls permissions per organizational policies Permissions can be changed in real time by the system administrator via a web control panel Data on USB flash devices is encrypted, and can be destroyed if a device is lost or stolen Supports logging and reporting of files burned to disc, files sent to USB devices, and administrative changes to permissions This product is targeted at larger enterprise customers The products are ideal for offices and organizations of any size, from small law offices to large international firms. In Conclusion Roxio Secure is a product line that enables encryption of data on removable media including optical discs and USB flash memory devices. Roxio Secure makes it easy for employees to automatically encrypt data per organizational policies, and helps to protect law firms and clients of law firms from the expense of data breach and non-compliance with mandated regulations. Roxio Secure solutions are an inexpensive and convenient way for law offices to ensure that confidential records stored on optical and USB flash media are only viewable by authorized personnel, and can help to ensure compliance with mandated regulations.

Contact To request a quote, contact the Volume Licensing Sales team at: North America: Tel: 866-825-7694 or 972-713-8110 Email: vlp@roxio.com Europe: Email: vlp.emea@roxio.com Rovi Corporation or its subsidiaries. All rights reserved.