SlideShare a Scribd company logo
1 of 2
Download to read offline
COHENLAW.COM © COPYRIGHT 2017 COHEN & GRIGSBY, P.C. ALL RIGHTS RESERVED.
Data Security, Privacy and Information Governance:
Initial Risk Assessment
The Initial Legal Risk Assessment is a Cohen & Grigsby service to assist our clients with a preliminary
analysis of their business practices and risk profile as they relate to the creation, use, protection, retention and
destruction of sensitive information. Using information we gather as part of the initial risk assessment, we are
able to help business leaders better understand their risk and risk management as it pertains to sensitive
information generated by, entrusted to, held by and otherwise controlled by the organization. We present
our findings in a report and presentation that contains (i) an overview of various information-related legal
obligations as they apply to the company; and (ii) an assessment of the company’s current practices and
controls designed to comply with those various obligations.
After completing the Initial Legal Risk Assessment, our clients are better able to prioritize their objectives
and marshal their resources in a manner that reflects the evolving demands of proper information governance
in the current business environment and legal landscape. With our streamlined, multi-disciplinary approach to
data privacy, security and information law, we can be there with you every step of the way.
We tailor our Initial Legal Risk Assessment to the size and needs of our clients. As a general matter,
however, we typically perform the following preliminary analyses:
Sensitive Data Identification
We work with our client to think broadly and identify the types and nature of sensitive data (e.g., PII,
PCI, ePHI, company trade secret and proprietary data, employee/HR information, payroll information,
controlled defense information, consumer credit information) within the company’s possession, custody or
control that may be subject to legal obligations relating to protection, retention or destruction of that data.
IT Environment Assessment
We help our client assess the appropriate scope of review for the company’s IT environment to identify
the various repositories, volume and accessibility of documents and electronically stored information within
the company’s possession, custody or control (including information that is self-hosted, cloud-hosted and
third-party entrusted).
Geographic Footprint Assessment
We review the company’s geographic footprint to identify jurisdiction-specific obligations (e.g., state
specific legal obligations (e.g., California, Massachusetts, New York), EU Data Privacy, Canada / CASL) relating
to the protection, retention or destruction of sensitive information within the company’s custody, possession
or control.
Third-Party Contract Review
We identify the company’s contracts with third-party vendors and service providers that have access to
or are entrusted with the company’s data (e.g., service agreements, non-disclosure agreements).
We identify contracts with third-party customers and business partners that have entrusted the
company with third parties’ data (e.g., service agreements, non-disclosure agreements, subcontracts).
COHENLAW.COM © COPYRIGHT 2017 COHEN & GRIGSBY, P.C. ALL RIGHTS RESERVED.
Internal Contract and Policy Review
We identify employee contracts as well as internal policies and controls governing the intake,
maintenance, retention, protection and destruction of information by the company’s employees (e.g., non-
disclosure agreements, assignment of inventions, employee handbooks, social media policies, technology use
policies, cybersecurity policies, data backup and business continuity plans).
Advertisement Assessment
We identify business-related communications and marketing referencing the company’s use and
protection of third parties’ information.
Litigation Readiness Assessment
We identify the company’s policies and procedures governing the implementation, maintenance and
cancellation of litigation hold notices. Further, we identify policies and procedures governing the company’s
identification, collection, search, analysis and production of documents and electronically stored information in
connection with litigation and other adversary proceedings.
Insurance Policy Review
We identify and assess insurance policies providing cybersecurity and information management
related coverage.
ABOUT COHEN & GRIGSBY
Since 1981, Cohen & Grigsby, P.C. and its attorneys have provided sound legal advice and solutions to clients that seek to
maximize their potential in a constantly changing global marketplace. Comprised of more than 140 lawyers, Cohen &
Grigsby maintains offices in Pittsburgh, PA and Naples, Fla. The firm’s practice areas include Business Services, Labor &
Employment, Immigration/International Business, Intellectual Property, Real Estate & Public Finance, Litigation,
Employee Benefits & Executive Compensation, Estates & Trusts, Bankruptcy & Creditors Rights, and Public
Affairs. Cohen & Grigsby represents private and publicly held businesses, nonprofits, multinational corporations,
individuals and emerging businesses across a full spectrum of industries. Our lawyers maintain an unwavering
commitment to customer service that ensures a productive partnership. For more information, visit www.cohenlaw.com.
The hiring of a lawyer is an important decision that should not be based solely upon advertisements. Before you decide, ask us to send
you free written information about Cohen & Grigsby’s qualifications and experience.
Bruce C. Chiu
Co-Chair,
Data Security, Privacy and Information
Governance group
412-297-4622
bchiu@cohenlaw.com
Fridrikh V. Shrayber
Co-Chair,
Data Security, Privacy and Information
Governance group
412-297-4612
fshrayber@cohenlaw.com

More Related Content

What's hot

What's hot (18)

Common Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A DealsCommon Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A Deals
 
Respond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqRespond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security req
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
California Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowCalifornia Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To Know
 
CMR - GDPR - general introduction for marketeers
CMR  -  GDPR - general introduction for marketeersCMR  -  GDPR - general introduction for marketeers
CMR - GDPR - general introduction for marketeers
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Lawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt YouLawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt You
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
GDPR - The new era of data protection
GDPR - The new era of data protectionGDPR - The new era of data protection
GDPR - The new era of data protection
 
Opportunities and benefits of POPI
Opportunities and benefits of POPIOpportunities and benefits of POPI
Opportunities and benefits of POPI
 
Legal Services for University Tech Transfer Offices
Legal Services for University Tech Transfer OfficesLegal Services for University Tech Transfer Offices
Legal Services for University Tech Transfer Offices
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Data privacy presentation
Data privacy presentationData privacy presentation
Data privacy presentation
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
Dpl november colombia
Dpl november   colombiaDpl november   colombia
Dpl november colombia
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Securing Confidential Data CI Webinar Series January 2014
Securing Confidential Data CI Webinar Series January 2014Securing Confidential Data CI Webinar Series January 2014
Securing Confidential Data CI Webinar Series January 2014
 

Similar to Data Security, Privacy and Information Governance: Initial Risk Assessment

CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
Dmcenter
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
Werksmans Attorneys
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
MSpadea
 
GDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptxGDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptx
pixvilx
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
sarah kabirat
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 

Similar to Data Security, Privacy and Information Governance: Initial Risk Assessment (20)

Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
 
BRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEBBRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEB
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
2018 Client Briefing GDPR
2018 Client Briefing GDPR2018 Client Briefing GDPR
2018 Client Briefing GDPR
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
DUE DILIGENCE
DUE DILIGENCE DUE DILIGENCE
DUE DILIGENCE
 
Global Business Ethics
Global Business EthicsGlobal Business Ethics
Global Business Ethics
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
GDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptxGDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptx
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Ss
SsSs
Ss
 

Recently uploaded

一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 

Recently uploaded (20)

Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 

Data Security, Privacy and Information Governance: Initial Risk Assessment

  • 1. COHENLAW.COM © COPYRIGHT 2017 COHEN & GRIGSBY, P.C. ALL RIGHTS RESERVED. Data Security, Privacy and Information Governance: Initial Risk Assessment The Initial Legal Risk Assessment is a Cohen & Grigsby service to assist our clients with a preliminary analysis of their business practices and risk profile as they relate to the creation, use, protection, retention and destruction of sensitive information. Using information we gather as part of the initial risk assessment, we are able to help business leaders better understand their risk and risk management as it pertains to sensitive information generated by, entrusted to, held by and otherwise controlled by the organization. We present our findings in a report and presentation that contains (i) an overview of various information-related legal obligations as they apply to the company; and (ii) an assessment of the company’s current practices and controls designed to comply with those various obligations. After completing the Initial Legal Risk Assessment, our clients are better able to prioritize their objectives and marshal their resources in a manner that reflects the evolving demands of proper information governance in the current business environment and legal landscape. With our streamlined, multi-disciplinary approach to data privacy, security and information law, we can be there with you every step of the way. We tailor our Initial Legal Risk Assessment to the size and needs of our clients. As a general matter, however, we typically perform the following preliminary analyses: Sensitive Data Identification We work with our client to think broadly and identify the types and nature of sensitive data (e.g., PII, PCI, ePHI, company trade secret and proprietary data, employee/HR information, payroll information, controlled defense information, consumer credit information) within the company’s possession, custody or control that may be subject to legal obligations relating to protection, retention or destruction of that data. IT Environment Assessment We help our client assess the appropriate scope of review for the company’s IT environment to identify the various repositories, volume and accessibility of documents and electronically stored information within the company’s possession, custody or control (including information that is self-hosted, cloud-hosted and third-party entrusted). Geographic Footprint Assessment We review the company’s geographic footprint to identify jurisdiction-specific obligations (e.g., state specific legal obligations (e.g., California, Massachusetts, New York), EU Data Privacy, Canada / CASL) relating to the protection, retention or destruction of sensitive information within the company’s custody, possession or control. Third-Party Contract Review We identify the company’s contracts with third-party vendors and service providers that have access to or are entrusted with the company’s data (e.g., service agreements, non-disclosure agreements). We identify contracts with third-party customers and business partners that have entrusted the company with third parties’ data (e.g., service agreements, non-disclosure agreements, subcontracts).
  • 2. COHENLAW.COM © COPYRIGHT 2017 COHEN & GRIGSBY, P.C. ALL RIGHTS RESERVED. Internal Contract and Policy Review We identify employee contracts as well as internal policies and controls governing the intake, maintenance, retention, protection and destruction of information by the company’s employees (e.g., non- disclosure agreements, assignment of inventions, employee handbooks, social media policies, technology use policies, cybersecurity policies, data backup and business continuity plans). Advertisement Assessment We identify business-related communications and marketing referencing the company’s use and protection of third parties’ information. Litigation Readiness Assessment We identify the company’s policies and procedures governing the implementation, maintenance and cancellation of litigation hold notices. Further, we identify policies and procedures governing the company’s identification, collection, search, analysis and production of documents and electronically stored information in connection with litigation and other adversary proceedings. Insurance Policy Review We identify and assess insurance policies providing cybersecurity and information management related coverage. ABOUT COHEN & GRIGSBY Since 1981, Cohen & Grigsby, P.C. and its attorneys have provided sound legal advice and solutions to clients that seek to maximize their potential in a constantly changing global marketplace. Comprised of more than 140 lawyers, Cohen & Grigsby maintains offices in Pittsburgh, PA and Naples, Fla. The firm’s practice areas include Business Services, Labor & Employment, Immigration/International Business, Intellectual Property, Real Estate & Public Finance, Litigation, Employee Benefits & Executive Compensation, Estates & Trusts, Bankruptcy & Creditors Rights, and Public Affairs. Cohen & Grigsby represents private and publicly held businesses, nonprofits, multinational corporations, individuals and emerging businesses across a full spectrum of industries. Our lawyers maintain an unwavering commitment to customer service that ensures a productive partnership. For more information, visit www.cohenlaw.com. The hiring of a lawyer is an important decision that should not be based solely upon advertisements. Before you decide, ask us to send you free written information about Cohen & Grigsby’s qualifications and experience. Bruce C. Chiu Co-Chair, Data Security, Privacy and Information Governance group 412-297-4622 bchiu@cohenlaw.com Fridrikh V. Shrayber Co-Chair, Data Security, Privacy and Information Governance group 412-297-4612 fshrayber@cohenlaw.com