SlideShare a Scribd company logo
1 of 3
Download to read offline
EMERGING COMPANIES GROUP 
PRIVACY AND INFORMATION SECURITY: WHAT EVERY NEW BUSINESS NEEDS TO KNOW 
NUTTER McCLENNEN & FISH LLP 
Reports of data security breaches conjure up images of anonymous computer hackers sitting in a darkened room, fingers flying over a key board in an effort to hack into a computer system to find valuable information to exploit. Not long ago, most of us considered these breaches to be infrequent and likely targeted at information much more commercially unique than the average consumer data stored by most businesses. 
Data breaches have become much more commonplace over the last decade and the information being sought by the intruders is often as mundane as personal identifying information, commonly kept in many corporate databases and paper records that can be easily used for lucrative identity theft. Perhaps even more disturbing, many, if not most, data security breach incidents result not from deliberate intrusion but from carelessness, such as lost or stolen laptops and portable drives, files sent to the wrong e-mail address or mistakenly exposed to public access on the internet, or paper records simply dumped in the garbage where any passer-by can pluck them out. In response, state and federal lawmakers and various government regulatory agencies have woven an evolving, and sometimes contradictory web of laws, rules and regulations meant to protect the privacy and security of many types of personal information, from consumer financial and medical data to student records. 
For an early-stage company, the liability or reputation damage that arises from a data security breach could be catastrophic. It is critical that new businesses understand the regulatory compliance landscape applicable to the information they maintain, take measures to secure nonpublic personal information, and be prepared to efficiently and effectively deal with any breaches or compromises that occur. 
Minimum Information Security Standards 
Banks, financial advisors and healthcare providers, among others, are subject to relatively uniform regulatory standards that require certain minimum security measures be taken to protect non-public personal financial and medical information. Typically, businesses in the financial services and healthcare industries, and their service providers, must develop written policies and procedures and implement administrative, technical and physical safeguards designed to protect the security and integrity of non-public personal information. Similarly, federal law requires educational institutions to protect personally identifiable education information about students from improper disclosure.
www.nutter.com | @NutterLaw 
In addition, Massachusetts and other states have adopted minimum information security standards that apply to non-public personal information. State information security standards can be stricter than federal requirements, and can apply more broadly. The Massachusetts information security standards apply to every business or other person in possession of non-public personal information of a Massachusetts resident, regardless of the industry, size or location of the business. Even businesses that do not collect personal information about their customers are subject to rules that apply to their employees. 
Privacy Requirements 
The area of privacy law was once primarily concerned with restrictions on the ability of the government to gather and use information about its citizens. The dawn of the information age has given rise to new concerns about how businesses gather and use information about consumers, and lawmakers have responded with various regulatory regimes meant to protect the privacy of consumers. Federal law restricts how businesses may share financial and medical information about consumers with third parties for various purposes. In addition, the Federal Trade Commission has, on more than one occasion, held businesses accountable for alleged violations of their own voluntarily adopted privacy policies. Consumers often expect businesses that interact with customers on the internet to post privacy policies on their websites. A business that does not adhere to its own privacy policy, whether deliberately or inadvertently, exposes itself to liability even if that business is not otherwise subject to legal privacy requirements. 
This article was prepared by Matthew Hanaghan, a member of the Emerging Companies Group at Nutter McClennen & Fish LLP. For more information, please contact Matt or your Nutter attorney at 617.439.2000. 
Data Security Breach Preparedness 
To date, 47 states and the District of Columbia have enacted laws that impose a duty to report known security breaches involving non-public personal information. Similar federal data security breach notice requirements apply to financial, medical and student records, among other personal information. 
The reporting obligations are far from uniform. Notification requirements in some states, such as Florida and Arizona, apply only to the loss of electronic data. In Massachusetts and other states, notice requirements apply to electronic and paper records containing personal information. There are also variations related to the timing of any required notice, which government authorities must be notified, and the content of the notices. 
What Every Business Should Do 
Regardless of the nature or size of the business, every company should consider developing and implementing a comprehensive written information security program. Each company’s record retention and disposal policy and privacy policy should be integrated with its information security program. The company’s board of directors or highest governing body should review and approve each policy and designate a senior management official to be responsible for supervising the policy. Finally, each policy should be reviewed for compliance with applicable law and adequacy of security measures no less than annually, whenever there is a material change in the company’s business practices or IT infrastructure, and in all cases after any data security breach.
www.nutter.com | @NutterLaw 
This article is for information purposes only and should not be construed as legal advice on any specific facts or circumstances. Under the rules of the Supreme Judicial Court of Massachusetts, this material may be considered as advertising. 
© 2014 Nutter McClennen & Fish LLP 
Responding to a Data Security Breach 
Avoid Panic. Whether you are CEO, CIO, general counsel or any other corporate officer, a data security breach is alarming, but there is no reason to panic. Assess the situation and formulate a reasoned plan of action, as you would approach any other corporate problem. 
Secure the System. Take appropriate steps to contain and control the incident, to prevent further unauthorized access to or use of personal information, and to preserve records and other evidence. If the incident involves a lost or stolen computer or other portable media, secure any back-up files that show the information contained in the compromised system. Make a mirror image of relevant components of your computer system or perform a comprehensive backup to ensure the preservation of information. 
Organize a Response Group. Notify other key officers and board members as quickly as possible. Establish a response group to make key decisions. The team should be comprised of individuals who have the technical expertise to understand the nature of the incident and are familiar with the information that may have been compromised. 
Retain Outside Counsel. Retain outside counsel with relevant expertise to help formulate a strategy, manage an internal investigation, interact with government attorneys and law enforcement, and comply with any notice requirements. Few in-house lawyers have sufficient expertise with data security breaches, and even those who do should not be the sole legal voice of the company. Outside counsel can increase the chances of preserving attorney- client privilege and can help to more objectively assess potential sources of liability and mitigation strategies. 
Engage a Computer Forensic Investigator. Enlist the services of a firm specializing in computer forensics, cyber- crime response, internal investigations, and the preservation, analysis and production of electronic data in the context of civil litigation, criminal and regulatory matters. Ideally, the forensic investigator should be retained through outside counsel to increase the chances of preserving attorney-client privilege for the results of the investigation. 
Notify Law Enforcement. Notify the appropriate federal or state law enforcement authority if there is reasonable concern that the data security breach may have involved a criminal act. Outside counsel can provide you with advice about who to notify and how to cooperate with any criminal investigation. 
Plan External Notifications and Media Response. State or federal law may require you to notify government agencies, affected individuals or the general public about the incident. Beyond any legal requirements, however, a company that has suffered a data security breach needs to consider that it might be in its best interests to get ahead of the story by issuing a clear, concise, professionally-crafted statement. It is imperative that all public statements be accurate while reassuring customers, prospects and employees. 
Review Your Company’s Privacy and Data Security Policies. If your company has adopted written privacy or data security policies, review them with counsel to assess the company’s compliance with those policies in the context of the incident. Any response to the incident should be consistent with your internal policies as well as applicable state and federal laws and regulations — keeping in mind that state law in multiple states might be applicable. 
Consider Engaging an Identity Theft Protection Provider. Identity theft protection firms that can help mitigate the effects of a future data security breach by providing a package of identity theft protection services, such as credit monitoring, identity theft insurance and identity recovery assistance, to affected individuals. An identity theft protection firm may also help you to manage your public response by coordinating the mailing of notices, and providing a telephone call center or web site to handle inquiries from affected individuals. 
Check Your Insurance. Check your Errors & Omissions and General Liability insurance policies and other policies for potential coverage. Take steps necessary to ensure that you do not lose coverage by failing to give the required notice to the insurer or to meet any other procedural requirements. Make sure that you understand the company’s indemnification obligations under contracts with any third party involved in the incident, such as a client or vendor.

More Related Content

What's hot

Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesJim Brashear
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachCBIZ, Inc.
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013- Mark - Fullbright
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updatesInes Mergel
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 

What's hot (20)

Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New Changes
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
Privacy trends 2011
Privacy trends 2011Privacy trends 2011
Privacy trends 2011
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 

Viewers also liked

Crowdfunding Options for Startups
Crowdfunding Options for StartupsCrowdfunding Options for Startups
Crowdfunding Options for StartupsThe Capital Network
 
TCN Fast Track Mentor Lunch Directory
TCN Fast Track Mentor Lunch DirectoryTCN Fast Track Mentor Lunch Directory
TCN Fast Track Mentor Lunch DirectoryThe Capital Network
 
How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...
How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...
How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...The Capital Network
 
TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17The Capital Network
 

Viewers also liked (6)

Entity Selection for Startups
Entity Selection for StartupsEntity Selection for Startups
Entity Selection for Startups
 
Navigating Founders Issues
Navigating Founders IssuesNavigating Founders Issues
Navigating Founders Issues
 
Crowdfunding Options for Startups
Crowdfunding Options for StartupsCrowdfunding Options for Startups
Crowdfunding Options for Startups
 
TCN Fast Track Mentor Lunch Directory
TCN Fast Track Mentor Lunch DirectoryTCN Fast Track Mentor Lunch Directory
TCN Fast Track Mentor Lunch Directory
 
How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...
How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...
How to Build a Cap Table and Understand the Dilution Impact of Early-Stage In...
 
TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17
 

Similar to Privacy and Information Security: What Every New Business Needs to Know

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens BankMichael Ouellet
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)guest95afa8
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From PplSue Tjernlund
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Pplsusantj3
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Robert MacLean
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008guestabd20
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White PaperTodd Ruback
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 

Similar to Privacy and Information Security: What Every New Business Needs to Know (20)

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens Bank
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 

More from The Capital Network

The Capital Network 2022 Fellowship Impact Report
The Capital Network 2022 Fellowship Impact ReportThe Capital Network 2022 Fellowship Impact Report
The Capital Network 2022 Fellowship Impact ReportThe Capital Network
 
TCN Fundraising Strategy for Female Founders 2022 (1).pdf
TCN Fundraising Strategy for Female Founders 2022 (1).pdfTCN Fundraising Strategy for Female Founders 2022 (1).pdf
TCN Fundraising Strategy for Female Founders 2022 (1).pdfThe Capital Network
 
TCN Fundraising Strategy for Female Founders 2022.pdf
TCN Fundraising Strategy for Female Founders 2022.pdfTCN Fundraising Strategy for Female Founders 2022.pdf
TCN Fundraising Strategy for Female Founders 2022.pdfThe Capital Network
 
Tcn investment & inclusion series - emerging fund managers opportunities and ...
Tcn investment & inclusion series - emerging fund managers opportunities and ...Tcn investment & inclusion series - emerging fund managers opportunities and ...
Tcn investment & inclusion series - emerging fund managers opportunities and ...The Capital Network
 
TCN 2021 Fellowship Impact Report
TCN 2021 Fellowship Impact ReportTCN 2021 Fellowship Impact Report
TCN 2021 Fellowship Impact ReportThe Capital Network
 
Crowdfunding Workshop with IFundWomen
Crowdfunding Workshop with IFundWomenCrowdfunding Workshop with IFundWomen
Crowdfunding Workshop with IFundWomenThe Capital Network
 
What you receive as a tcn female founder fellow
What you receive as a tcn female founder fellowWhat you receive as a tcn female founder fellow
What you receive as a tcn female founder fellowThe Capital Network
 
Tcn investment & inclusion panel - dei & vc firms- structural barriers to eq...
Tcn investment & inclusion panel -  dei & vc firms- structural barriers to eq...Tcn investment & inclusion panel -  dei & vc firms- structural barriers to eq...
Tcn investment & inclusion panel - dei & vc firms- structural barriers to eq...The Capital Network
 
What you receive as a tcn female founder fellow 2021
What you receive as a tcn female founder fellow 2021 What you receive as a tcn female founder fellow 2021
What you receive as a tcn female founder fellow 2021 The Capital Network
 
The Fellowship For Female Founders - Applications & What You Receive As A Fel...
The Fellowship For Female Founders - Applications & What You Receive As A Fel...The Fellowship For Female Founders - Applications & What You Receive As A Fel...
The Fellowship For Female Founders - Applications & What You Receive As A Fel...The Capital Network
 
The CARES ACT - What's In It For Startups?
The CARES ACT - What's In It For Startups?The CARES ACT - What's In It For Startups?
The CARES ACT - What's In It For Startups?The Capital Network
 
Getting started with SBIR by the isis group
Getting started with SBIR by the isis groupGetting started with SBIR by the isis group
Getting started with SBIR by the isis groupThe Capital Network
 
Calculate Financial Projections for Investment Presentations
Calculate Financial Projections for Investment PresentationsCalculate Financial Projections for Investment Presentations
Calculate Financial Projections for Investment PresentationsThe Capital Network
 
Angel_financing_term_sheet_7/26/18
Angel_financing_term_sheet_7/26/18Angel_financing_term_sheet_7/26/18
Angel_financing_term_sheet_7/26/18The Capital Network
 
Nutter: Emerging Companies & Entrepreneurship
Nutter: Emerging Companies & EntrepreneurshipNutter: Emerging Companies & Entrepreneurship
Nutter: Emerging Companies & EntrepreneurshipThe Capital Network
 
TCN Presents: Choosing & Managing Your Board
TCN Presents: Choosing & Managing Your Board TCN Presents: Choosing & Managing Your Board
TCN Presents: Choosing & Managing Your Board The Capital Network
 

More from The Capital Network (20)

The Capital Network 2022 Fellowship Impact Report
The Capital Network 2022 Fellowship Impact ReportThe Capital Network 2022 Fellowship Impact Report
The Capital Network 2022 Fellowship Impact Report
 
TCN Fundraising Strategy for Female Founders 2022 (1).pdf
TCN Fundraising Strategy for Female Founders 2022 (1).pdfTCN Fundraising Strategy for Female Founders 2022 (1).pdf
TCN Fundraising Strategy for Female Founders 2022 (1).pdf
 
TCN Fundraising Strategy for Female Founders 2022.pdf
TCN Fundraising Strategy for Female Founders 2022.pdfTCN Fundraising Strategy for Female Founders 2022.pdf
TCN Fundraising Strategy for Female Founders 2022.pdf
 
Tcn investment & inclusion series - emerging fund managers opportunities and ...
Tcn investment & inclusion series - emerging fund managers opportunities and ...Tcn investment & inclusion series - emerging fund managers opportunities and ...
Tcn investment & inclusion series - emerging fund managers opportunities and ...
 
TCN 2021 Fellowship Impact Report
TCN 2021 Fellowship Impact ReportTCN 2021 Fellowship Impact Report
TCN 2021 Fellowship Impact Report
 
Crowdfunding Workshop with IFundWomen
Crowdfunding Workshop with IFundWomenCrowdfunding Workshop with IFundWomen
Crowdfunding Workshop with IFundWomen
 
TCN Cash flow workshop slides
TCN Cash flow workshop slidesTCN Cash flow workshop slides
TCN Cash flow workshop slides
 
What you receive as a tcn female founder fellow
What you receive as a tcn female founder fellowWhat you receive as a tcn female founder fellow
What you receive as a tcn female founder fellow
 
2021 tcn resource guide final
2021 tcn resource guide final2021 tcn resource guide final
2021 tcn resource guide final
 
Tcn investment & inclusion panel - dei & vc firms- structural barriers to eq...
Tcn investment & inclusion panel -  dei & vc firms- structural barriers to eq...Tcn investment & inclusion panel -  dei & vc firms- structural barriers to eq...
Tcn investment & inclusion panel - dei & vc firms- structural barriers to eq...
 
What you receive as a tcn female founder fellow 2021
What you receive as a tcn female founder fellow 2021 What you receive as a tcn female founder fellow 2021
What you receive as a tcn female founder fellow 2021
 
The Fellowship For Female Founders - Applications & What You Receive As A Fel...
The Fellowship For Female Founders - Applications & What You Receive As A Fel...The Fellowship For Female Founders - Applications & What You Receive As A Fel...
The Fellowship For Female Founders - Applications & What You Receive As A Fel...
 
The CARES ACT - What's In It For Startups?
The CARES ACT - What's In It For Startups?The CARES ACT - What's In It For Startups?
The CARES ACT - What's In It For Startups?
 
Getting started with SBIR by the isis group
Getting started with SBIR by the isis groupGetting started with SBIR by the isis group
Getting started with SBIR by the isis group
 
2019 accelerator info handout
2019 accelerator info handout2019 accelerator info handout
2019 accelerator info handout
 
Calculate Financial Projections for Investment Presentations
Calculate Financial Projections for Investment PresentationsCalculate Financial Projections for Investment Presentations
Calculate Financial Projections for Investment Presentations
 
You have the Money - Now What?
You have the Money - Now What? You have the Money - Now What?
You have the Money - Now What?
 
Angel_financing_term_sheet_7/26/18
Angel_financing_term_sheet_7/26/18Angel_financing_term_sheet_7/26/18
Angel_financing_term_sheet_7/26/18
 
Nutter: Emerging Companies & Entrepreneurship
Nutter: Emerging Companies & EntrepreneurshipNutter: Emerging Companies & Entrepreneurship
Nutter: Emerging Companies & Entrepreneurship
 
TCN Presents: Choosing & Managing Your Board
TCN Presents: Choosing & Managing Your Board TCN Presents: Choosing & Managing Your Board
TCN Presents: Choosing & Managing Your Board
 

Recently uploaded

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...yulianti213969
 
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...lizamodels9
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...pr788182
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 

Recently uploaded (20)

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
 
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Privacy and Information Security: What Every New Business Needs to Know

  • 1. EMERGING COMPANIES GROUP PRIVACY AND INFORMATION SECURITY: WHAT EVERY NEW BUSINESS NEEDS TO KNOW NUTTER McCLENNEN & FISH LLP Reports of data security breaches conjure up images of anonymous computer hackers sitting in a darkened room, fingers flying over a key board in an effort to hack into a computer system to find valuable information to exploit. Not long ago, most of us considered these breaches to be infrequent and likely targeted at information much more commercially unique than the average consumer data stored by most businesses. Data breaches have become much more commonplace over the last decade and the information being sought by the intruders is often as mundane as personal identifying information, commonly kept in many corporate databases and paper records that can be easily used for lucrative identity theft. Perhaps even more disturbing, many, if not most, data security breach incidents result not from deliberate intrusion but from carelessness, such as lost or stolen laptops and portable drives, files sent to the wrong e-mail address or mistakenly exposed to public access on the internet, or paper records simply dumped in the garbage where any passer-by can pluck them out. In response, state and federal lawmakers and various government regulatory agencies have woven an evolving, and sometimes contradictory web of laws, rules and regulations meant to protect the privacy and security of many types of personal information, from consumer financial and medical data to student records. For an early-stage company, the liability or reputation damage that arises from a data security breach could be catastrophic. It is critical that new businesses understand the regulatory compliance landscape applicable to the information they maintain, take measures to secure nonpublic personal information, and be prepared to efficiently and effectively deal with any breaches or compromises that occur. Minimum Information Security Standards Banks, financial advisors and healthcare providers, among others, are subject to relatively uniform regulatory standards that require certain minimum security measures be taken to protect non-public personal financial and medical information. Typically, businesses in the financial services and healthcare industries, and their service providers, must develop written policies and procedures and implement administrative, technical and physical safeguards designed to protect the security and integrity of non-public personal information. Similarly, federal law requires educational institutions to protect personally identifiable education information about students from improper disclosure.
  • 2. www.nutter.com | @NutterLaw In addition, Massachusetts and other states have adopted minimum information security standards that apply to non-public personal information. State information security standards can be stricter than federal requirements, and can apply more broadly. The Massachusetts information security standards apply to every business or other person in possession of non-public personal information of a Massachusetts resident, regardless of the industry, size or location of the business. Even businesses that do not collect personal information about their customers are subject to rules that apply to their employees. Privacy Requirements The area of privacy law was once primarily concerned with restrictions on the ability of the government to gather and use information about its citizens. The dawn of the information age has given rise to new concerns about how businesses gather and use information about consumers, and lawmakers have responded with various regulatory regimes meant to protect the privacy of consumers. Federal law restricts how businesses may share financial and medical information about consumers with third parties for various purposes. In addition, the Federal Trade Commission has, on more than one occasion, held businesses accountable for alleged violations of their own voluntarily adopted privacy policies. Consumers often expect businesses that interact with customers on the internet to post privacy policies on their websites. A business that does not adhere to its own privacy policy, whether deliberately or inadvertently, exposes itself to liability even if that business is not otherwise subject to legal privacy requirements. This article was prepared by Matthew Hanaghan, a member of the Emerging Companies Group at Nutter McClennen & Fish LLP. For more information, please contact Matt or your Nutter attorney at 617.439.2000. Data Security Breach Preparedness To date, 47 states and the District of Columbia have enacted laws that impose a duty to report known security breaches involving non-public personal information. Similar federal data security breach notice requirements apply to financial, medical and student records, among other personal information. The reporting obligations are far from uniform. Notification requirements in some states, such as Florida and Arizona, apply only to the loss of electronic data. In Massachusetts and other states, notice requirements apply to electronic and paper records containing personal information. There are also variations related to the timing of any required notice, which government authorities must be notified, and the content of the notices. What Every Business Should Do Regardless of the nature or size of the business, every company should consider developing and implementing a comprehensive written information security program. Each company’s record retention and disposal policy and privacy policy should be integrated with its information security program. The company’s board of directors or highest governing body should review and approve each policy and designate a senior management official to be responsible for supervising the policy. Finally, each policy should be reviewed for compliance with applicable law and adequacy of security measures no less than annually, whenever there is a material change in the company’s business practices or IT infrastructure, and in all cases after any data security breach.
  • 3. www.nutter.com | @NutterLaw This article is for information purposes only and should not be construed as legal advice on any specific facts or circumstances. Under the rules of the Supreme Judicial Court of Massachusetts, this material may be considered as advertising. © 2014 Nutter McClennen & Fish LLP Responding to a Data Security Breach Avoid Panic. Whether you are CEO, CIO, general counsel or any other corporate officer, a data security breach is alarming, but there is no reason to panic. Assess the situation and formulate a reasoned plan of action, as you would approach any other corporate problem. Secure the System. Take appropriate steps to contain and control the incident, to prevent further unauthorized access to or use of personal information, and to preserve records and other evidence. If the incident involves a lost or stolen computer or other portable media, secure any back-up files that show the information contained in the compromised system. Make a mirror image of relevant components of your computer system or perform a comprehensive backup to ensure the preservation of information. Organize a Response Group. Notify other key officers and board members as quickly as possible. Establish a response group to make key decisions. The team should be comprised of individuals who have the technical expertise to understand the nature of the incident and are familiar with the information that may have been compromised. Retain Outside Counsel. Retain outside counsel with relevant expertise to help formulate a strategy, manage an internal investigation, interact with government attorneys and law enforcement, and comply with any notice requirements. Few in-house lawyers have sufficient expertise with data security breaches, and even those who do should not be the sole legal voice of the company. Outside counsel can increase the chances of preserving attorney- client privilege and can help to more objectively assess potential sources of liability and mitigation strategies. Engage a Computer Forensic Investigator. Enlist the services of a firm specializing in computer forensics, cyber- crime response, internal investigations, and the preservation, analysis and production of electronic data in the context of civil litigation, criminal and regulatory matters. Ideally, the forensic investigator should be retained through outside counsel to increase the chances of preserving attorney-client privilege for the results of the investigation. Notify Law Enforcement. Notify the appropriate federal or state law enforcement authority if there is reasonable concern that the data security breach may have involved a criminal act. Outside counsel can provide you with advice about who to notify and how to cooperate with any criminal investigation. Plan External Notifications and Media Response. State or federal law may require you to notify government agencies, affected individuals or the general public about the incident. Beyond any legal requirements, however, a company that has suffered a data security breach needs to consider that it might be in its best interests to get ahead of the story by issuing a clear, concise, professionally-crafted statement. It is imperative that all public statements be accurate while reassuring customers, prospects and employees. Review Your Company’s Privacy and Data Security Policies. If your company has adopted written privacy or data security policies, review them with counsel to assess the company’s compliance with those policies in the context of the incident. Any response to the incident should be consistent with your internal policies as well as applicable state and federal laws and regulations — keeping in mind that state law in multiple states might be applicable. Consider Engaging an Identity Theft Protection Provider. Identity theft protection firms that can help mitigate the effects of a future data security breach by providing a package of identity theft protection services, such as credit monitoring, identity theft insurance and identity recovery assistance, to affected individuals. An identity theft protection firm may also help you to manage your public response by coordinating the mailing of notices, and providing a telephone call center or web site to handle inquiries from affected individuals. Check Your Insurance. Check your Errors & Omissions and General Liability insurance policies and other policies for potential coverage. Take steps necessary to ensure that you do not lose coverage by failing to give the required notice to the insurer or to meet any other procedural requirements. Make sure that you understand the company’s indemnification obligations under contracts with any third party involved in the incident, such as a client or vendor.