SlideShare a Scribd company logo
1 of 48
1
2
Practical and entertaining education for
attorneys, accountants, business owners and
executives, and investors.
3
Thank You To Our Sponsor
Disclaimer
The material in this webinar is for informational purposes only. It should not be considered
legal, financial or other professional advice. You should consult with an attorney or other
appropriate professional to determine what may be best for your individual needs. While
Financial Poiseā„¢ takes reasonable steps to ensure that information it publishes is accurate,
Financial Poiseā„¢ makes no guaranty in this regard.
5
Meet the Faculty
MODERATOR:
Kathryn Nadro - Sugar Felsenthal Grais & Helsinger LLP
PANELISTS:
Cassandra Porter - Zuora
Kristin Garris - Warshaw Burstein, LLP
Michael Riela - Tannenbaum Helpern Syracuse & Hirschtritt LLP
6
About This Webinar ā€“ Introduction to US Privacy
and Data Security: Regulations and Requirements
There is no federal law governing privacy and data security applicable to all US citizens.
Rather, individual states and regulatory agencies have created a patchwork of protections
that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and
regulations which may impact your business, from the state law protecting personal
information to regulations covering the financial services industry to state breach notification
laws.
7
About This Series ā€“ Cybersecurity and Data Privacy
Data security, data privacy, and cybersecurity are critical issues for your company to consider
in todayā€™s business landscape. Data breaches from high profile companies, including law
firms, generate worldwide headlines and can severely damage your businessā€™s reputation. In
certain industries, a patchwork of state and federal laws and regulations may cover your
business, leading to compliance headaches. This series explores the various laws and
regulations which govern businesses both in the US and abroad, as well as how to implement
and enforce an information security policy to protect your company and limit any damage from
a data breach.
Each Financial Poise Webinar is delivered in Plain English, understandable to investors, business owners, and
executives without much background in these areas, yet is of primary value to attorneys, accountants, and other
seasoned professionals. Each episode brings you into engaging, sometimes humorous, conversations designed to
entertain as it teaches. Each episode in the series is designed to be viewed independently of the other episodes so that
participants will enhance their knowledge of this area whether they attend one, some, or all episodes.
8
Episodes in this Series
#1: Introduction to US Privacy and Data Security: Regulations and Requirements
Premiere date: 9/24/20
#2: Introduction to EU General Data Protection Regulation: Planning,
Implementation, and Compliance
Premiere date: 10/22/20
#3: How to Build and Implement your Company's Information Security Program
Premiere date: 11/19/20
#4: Data Breach Response: Before and After the Breach
Premiere date: 12/17/20
9
Episode #1
Introduction to US Privacy and Data Security:
Regulations and Requirements
10
What is Data Security?
ā€¢ Confidentiality, availability, and integrity of data
ā€¢ All the practices and processes used to protect data from being used or accessed by
unauthorized individuals
ā€¢ How a company safeguards the data it collects and uses from threats
11
What is Data Privacy?
ā€¢ The appropriate use of data, including the use of data according to agreed purposes
ā€¢ How a company uses the data that it has collected
12
What is Personal Information?
ā€¢ ā€œpersonally identifiable informationā€ sometimes called ā€œPIIā€
ļƒ¼ Can be linked to a specific individual
ļƒ¼ Name, email, full postal address, birth date, SSN, driverā€™s license number,
account numbers
ā€¢ ā€œnon-personally identifiable informationā€
ļƒ¼ Cannot by itself be used to identify a specific individual
ļƒ¼ Aggregate data, zip code, area code, city, state, gender, age
13
What is Personal Information?
ā€¢ Gray area ā€“ ā€œanonymizedā€ data
ļƒ¼ Non-PII that, when linked with other data, can effectively identify a person
ļƒ¼ Geolocation data
ļƒ¼ Site history and viewing patterns from IP address
ļƒ¼ Note: recent rollback of privacy regulation with the FCC?
14
Why Do We Need to Protect It?
ā€¢ Data is a corporate asset
ā€¢ Corporate data is at a higher risk of theft or misuse than ever before
ā€¢ Consumers now expect companies to take initiative to protect both security and privacy
15
What Must Companies Do to Protect It?
ā€¢ Compliance with state, local, federal laws and regulations
ļƒ¼ Patchwork of laws developed by sector
ļƒ¼ Contrast to Europe, which has a centralized, uniform law
ļƒ¼ Makes it difficult to comply when multiple, possibly inconsistent laws apply
ā€¢ Contracts with third parties
16
What Must Companies Do to Protect It?
ā€¢ Privacy policies for website users
ļƒ¼ Donā€™t need one if: website is static, is purely B2B, and collects no PII from
consumers
ļƒ¼ Should cover:
o Actual practices for PII and information that reasonably could be
associated with a person or device, regarding collection, storage, use, and
sharing of info
ļƒ¼ Be aware of: financial information, medical information, childrenā€™s information
ā€¢ Privacy audits:
ļƒ¼ Run them periodically to review and assess policies and practice for data
17
What Must Companies Do to Protect It?
ā€¢ Your company may have more PII than you are aware of
ļƒ¼ For example, if your company gives out commercial loans, it must comply with
GLB
ļƒ¼ BUT: if you also take guarantees, then you have personal information such as
account information, possibly life insurance information, mortgage information,
etc. that must be secured
ļƒ¼ Have to think more creatively about what types of information you might be
collecting
o Credit card payments ā€“ have to secure that information
18
California Consumer Privacy Act
ā€¢ Effective January 1, 2020, companies will have to observe restrictions on data
monetization business models, accommodate rights to access, deletion, and porting of
personal data, and update privacy policies
ā€¢ ā€œConsumersā€ (defined as natural persons who are California residents) have the right to
know what personal information a business has collected about them and what it is used for,
the right to opt out of allowing a business to sell their personal information to third parties, the
right to have a business delete personal information, and the right to receive equal servicing
and pricing from a business even if they exercise their privacy rights under the Act.
19
California Consumer Privacy Act
ā€¢ ā€œpersonal informationā€ is ā€œany information thatā€¦relates toā€¦a particular consumer or
householdā€
ļƒ¼ Information about a household may include information like utility bills or
pricing
ā€¢ Companies must comply if they receive personal data from California residents and they
or their parent company or a subsidiary exceed (a) annual gross revenues of $25 million, (b)
obtains personal information of 50,000 or more California residents, households or devices
annually, or (c) 50 percent or more annual revenue from selling California residentsā€™ personal
information.
20
California Consumer Privacy Act
ā€¢ The Act provides a private right of action that allows consumers to seek, either
individually or as a class, statutory or actual damages and injunctive relief, if their sensitive
personal information is subject to unauthorized access and exfiltration, theft or disclosure as a
result of a businessā€™s failure to implement and maintain reasonable security measures
ļƒ¼ Statutory damages can be between $100 and $750 per California resident per
incident, or actual damages, whichever is greater
21
New York Stop Hacks and Improve Electronic Data
Security (ā€œSHIELDā€) Act
ā€¢ Expands NY breach notification law and imposes data security program requirements on
businesses that possess the private information of New York State residents
ā€¢ Applies regardless of whether the businesses have any physical presence in New York
State
ā€¢ Program requirements include administrative, technical, and physical safeguards for
detecting and responding to intrusions and maintaining security of information
ā€¢ Businesses subject to and in compliance with Gramm-Leach-Bliley, HIPAA, or the NY
Dept. of Financial Services Cybersecurity Requirements are exempted from this requirement
under the SHIELD Act
ā€¢ Limited reprieve for ā€œsmall businessesā€ with fewer than fifty employees, less than $3
million in gross revenues in the last three fiscal years, or less than $5 million in year-end total
assets
ā€¢ Expands the definition of ā€œprivate informationā€ subject to NY data breach notification law
ā€¢ NY Attorney General can pursue civil penalties, but there is no private right of action
22
Massachusetts Standards ā€“ 201 C.M.R. 17
ā€¢ 2010 law ā€“ most protective privacy law in the US at that time
ā€¢ Requires every business that licenses or owns personal information of Massachusetts
residents to comply with the minimum security standards set forth in the regulation
ā€¢ Considered the gold standard
ā€¢ Require, when technically feasible, the encryption of personal information stored on
portable devices and personal information transmitted across public networks or wirelessly
23
Massachusetts Standards ā€“ 201 C.M.R. 17
ā€¢ Requires any natural person or entity that owns or licenses information of a Mass.
Resident to implement a written information security program (ā€œWISPā€) with appropriate
administrative, technical, and physical safeguards
ļƒ¼ Standards must be consistent with those set forth in state and federal
regulations to which a business is subject, including data breach notification
laws, HIPAA, and the Gramm-Leach-Bliley Act
24
Massachusetts Standards ā€“ 201 C.M.R. 17
ā€¢ ā€œpersonal informationā€ ā€“ ā€œa Massachusetts residentā€™s first name and last name or first
initial and last name in combination with any one or more of the following data elements
that relate to such resident: (a) Social Security number; (b) driverā€™s license number or
state-issued identification card number; or (c) financial account number, or credit or debit
card number, with or without any required security code, access code, personal
identification number or password, that would permit access to a residentā€™s financial
account.ā€
25
GDPR and the Shrems II Decision
ā€¢ New decision from the Court of Justice of the European Union
ā€¢ Invalidated the US-EU Privacy Shield
ā€¢ Closes off key mechanisms for transferring personal data from the EU to the US
ā€¢ Shrems I invalidated European Commission adequacy decisions with respect to EU-U.S.
Safe Harbor
ā€¢ CJEU was concerned with US government access to personal data for national security
purposes and the rights of EU citizens in the US to judicial review and redress
ā€¢ CJEU found the U.S. was not according EU personal data the protection and rights of
redress available in the EU
ā€¢ International data flows can continue to be based on EU Standard Contractual Clauses if
properly monitored
26
Gramm-Leach-Bliley
ā€¢ Overseen by the FTC
ļƒ¼ Requires financial institutions (companies that offer consumers financial
products or services like loans, financial or investment advice, or insurance) ā€“
to explain their information-sharing practices to their customers and to
safeguard sensitive data.
ā€¢ The Gramm-Leach-Bliley Act (GLBA) requires financial institutions to provide notice of
their privacy policies and practices to their customers, and prohibits financial institutions from
disclosing non-public personal information about a consumer to non-affiliated third parties,
unless the institutions provide certain information to the consumer and the consumer has not
elected to opt out.
27
Gramm-Leach-Bliley
ā€¢ The GLBA also requires financial institutions to protect the security and confidentiality of
their customersā€™ non-public personal information.
ā€¢ Regulators (e.g., the Securities and Exchange Commission, the Office of the Comptroller
of the Currency, the Federal Reserve and the Commodity Futures Trading Commission) have
promulgated rules under the GLBA.
28
HIPAA
ā€¢ The Health Insurance Portability and Accountability Act (HIPAA) regulates medical
information.
ā€¢ HIPAA Privacy Rule:
ļƒ¼ Requires appropriate safeguards to protect the privacy of ā€œprotected health
informationā€ (PHI).
ļƒ¼ Sets limits and conditions on the uses and disclosures that may be made of
such information without patient authorization.
ā€¢ Gives patients rights over their health information, including rights to examine and obtain
a copy of their health records, and to request corrections.
29
HIPAA
ā€¢ HIPAA Security Rule requires appropriate administrative, physical and technical
safeguards to ensure the confidentiality, integrity, and security of ā€œelectronic protected health
informationā€ (ePHI).
ā€¢ Privacy Rule and Security Rule are primarily enforced by the U.S. Department of Health
& Human Services Office for Civil Rights.
30
COPPA
ā€¢ Childrenā€™s Online Privacy Protection Act (administered by the FTC)
ļƒ¼ Requires parental consent for the collection or use of any personal data for a
child under 13 years old
ļƒ¼ Requires posting of a privacy policy on the website
ļƒ¼ Site operators must permit parental review of any data stored on their child
ļƒ¼ Parents are permitted to delete, but not otherwise alter, their childā€™s data
31
FTC Act
ā€¢ Section 5(a) of the FTC Act prohibits ā€œunfair methods of competition in or affecting
commerce, and unfair or deceptive acts or practices in or affecting commerce.ā€
ā€¢ Under Section 5(n) of FTC Act, the Federal Trade Commission (FTC) may prohibit an
act or practice on the grounds that it is ā€œunfair,ā€ if it causes (or is likely to cause) substantial
injury to consumers that is:
ļƒ¼ Not reasonably avoidable by consumers themselves and
ļƒ¼ Not outweighed by countervailing benefits to consumers or to competition.
32
FTC Act
ā€¢ ā€œunfairā€ if: a practice causes or is likely to cause substantial injury to consumers, cannot
be reasonably avoided by consumers, and it is not outweighed by countervailing benefits to
consumers or to competition
ā€¢ ā€œdeceptiveā€ if: practice misleads, or is likely to mislead, consumers, consumersā€™
interpretation of it is reasonable under circumstances, and it is material
ļƒ¼ Examples of deceptive: violating published privacy policies, downloading
spyware or adware onto unsuspecting usersā€™ computers, failing to verify
identity of persons to whom confidential consumer information was disclosed
ļƒ¼ Examples of unfair: failing to implement reasonable safeguards to protect
privacy of consumer information
33
FTC Act
ā€¢ FTC is the main federal regulator in charge of policing privacy and cybersecurity
practices among U.S. companies generally.
ā€¢ FTC pursues cases against companies for ā€œunfairā€ or ā€œdeceptiveā€ practices, where the
company allegedly had inadequate cybersecurity practices, or overstated how comprehensive
their privacy and cybersecurity practices were.
ā€¢ Consent decrees and settlements often result in monetary damages, and requirements
that companies establish rigorous privacy and data security practices (which would be
overseen by the FTC).
34
CAN-SPAM Act
ā€¢ The Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-
SPAM Act) regulates emails that companies send for primarily commercial purposes (e.g.,
advertisements).
ā€¢ Bans false or misleading header information and prohibits deceptive subject lines.
ā€¢ Requires that unsolicited commercial email be identified as advertising and allow
recipients to opt out of receiving future emails.
ā€¢ FTC enforces the CAN-SPAM Act.
35
The Telephone Consumer Protection Act (TCPA)
ā€¢ Restricts the making of telemarketing calls and the use of automatic telephone dialing
systems and artificial or pre-recorded voice messages.
ā€¢ TCPA creates a private right of action for consumers, and has been a source of
significant class action activity.
ā€¢ Federal Communications Commission (FCC) and state attorneys general enforce the
TCPA.
36
The Fair Credit Reporting Act (As Amended by the Fair
and Accurate Credit Transactions Act) Applies to:
ā€¢ Consumer reporting agencies (e.g., Equifax, Experian and TransUnion);
ā€¢ Companies that use consumer reports (e.g., lenders); and
ā€¢ Companies that provide consumer reporting information (e.g., credit card companies).
37
State Level Data Breach Laws
ā€¢ All 50 states, the District of Columbia, and some U.S. territories have their own data
breach notification laws
ā€¢ These laws generally require notification of affected individuals and regulators when a
company suffers a breach of the security of an individualā€™s personally identifiable information
(PII).
ā€¢ If a company suffers a data breach involving the PII of customers or employees who are
resident in multiple states, it will need to comply with each applicable stateā€™s laws.
38
What is a Data Breach? (That May Trigger State
Notification Laws)
ā€¢ Unauthorized acquisition of PII that compromises the security, confidentiality or integrity
of PIIā€¦
ļƒ¼ That results or could result in identity theft or fraud (OH)
ļƒ¼ Unless PII is not used or subject to further unauthorized disclosure (NE)
ļƒ¼ Unless no misuse of PII has occurred or is not reasonably likely to occur (NJ)
ļƒ¼ Unless no reasonable likelihood of harm to consumer whose PII was acquired
has resulted or will result (CT)
ļƒ¼ That has caused or is likely to cause loss or injury to resident (MI)
ļƒ¼ That causes or is reasonably likely to cause substantial economic loss to the
individual (AZ)
ļƒ¼ Unless no reasonable likelihood of financial harm to consumer whose PII was
acquired has resulted or will result (IA)
39
Why We Should be Careful with the Word ā€œBreachā€
ā€¢ Using ā€œbreachā€ to describe a data-privacy related incident assumes the incident meets
the definition of a security breach which triggers various notification requirements
ā€¢ An ā€œincidentā€ does not always rise to the level of ā€œbreachā€ (i.e., encryption safe harbor)
ā€¢ ā€œIncidentā€ is better received by the public than ā€œbreachā€
40
Breach Notification Laws
ā€¢ State laws differ with respect to:
ļƒ¼ Deadline for notifying (14, 30, 45 days; reasonable time)
ļƒ¼ Notification to Attorney General
ļƒ¼ Notification to other State agencies
ļƒ¼ Including Attorney General contact information
ļƒ¼ Substitute notice (email, website, media)
ļƒ¼ Specific facts of incident and type of PII compromised
ļƒ¼ Maintaining records of incident (for 3-5 years)
ļƒ¼ Countries also differ with notice requirements
41
About the Faculty
42
About The Faculty
Kathryn Nadro - knadro@sfgh.com
Kathryn (ā€œKatieā€) Nadro advises clients on a diverse array of business matters, including commercial and
business disputes, employment issues, and data security and privacy compliance. Katie works with
individuals and businesses of all sizes to craft successful resolutions tailored to each individual matter.
Katie has broad experience representing companies and individuals in contract, non-compete,
discrimination, harassment, fiduciary duty, and trade secret litigation in state and federal court. With a
background as both in-house and outside counsel, Katie understands that business objectives, time, and
resources play an important role in reaching a favorable outcome for each client. Katie assists clients in
navigating employment issues ranging from employee handbooks and FMLA policies to litigating
discrimination and harassment claims, all while ensuring business needs and objectives are met. She
also counsels clients on data security and privacy issues, including policy drafting and compliance with
state, federal, and international law.
43
Cassandra Porter - caporter@zuora.com
Cassandra M. Porter is the Americas/APAC data privacy lead attorney for a Fortune 100 Tech company
working to transform clientsā€™ businesses, operations and technology models for the digital era. She
counsels internal clients on privacy-related matters such as data collection practices, online advertising,
mobile commerce, along with the development and acquisition of new technology, data incidents and
management. Cassandra is a member of the inaugural class of Privacy Law Specialists, a new specialty
recognized by the American Bar Association, and a Fellow of Information Privacy by the International
Association of Privacy Professionals (IAPP). Her IAPP credentials as a Certified Information Privacy
Professional and Certified Information Privacy Manager designate her as thought leader in the field. She
is a former co-chair of the IAPPā€™s New Jersey Chapter and member of the Bankruptcy Lawyers Advisory
Committee for the District of New Jersey. As a member of the United States Trusteeā€™s Consumer Privacy
Ombudsman (CPO) panel, she served as the CPO in the Golfsmith International chapter 11
cases. Previously she was counsel at Lowenstein Sandler LLP where, in addition to assisting clients with
data privacy-related issues, she also regularly represented debtors in possession and creditors in chapter
11 matters along with indigents in chapter 7 proceedings in association with the Volunteer Lawyers for
Justice. Prior to joining Lowenstein, she clerked for the Honorable Cecelia Morris, United States
Bankruptcy Judge for the Southern District of New York and was the Assistant Managing Attorney at
Kaye Scholer LLP.
44
About The Faculty
Kristin Garris - kgarris@wbny.com
Kristin G. Garris is a member of Warshaw Burstein, LLP's Intellectual Property practice group who has a
broad range of experience in handling matters related to trademark, copyright, Internet, and domain
name enforcement and litigation. Ms. Garris counsels clients on a wide range of intellectual property
issues, including IP ownership and protection, trademark enforcement and litigation, branding procedures
and management, copyright protection, licensing, domain names, privacy policies and website terms of
use, IP-related risk management, IP due diligence, data privacy regulations, and much more. She also
has significant experience with opposition and cancellation proceedings before the Trademark Trial and
Appeal Board of the U.S. Patent and Trademark Office. In addition, Ms. Garris is skilled in representing
clients with domain name disputes before the World Intellectual Property Organizationā€™s Arbitration and
Mediation Center, as well as a broad range of other Internet-related disputes and trademark and
copyright enforcements in connection with social media. With twelve years of experience in intellectual
property, Ms. Garris is adept in representing clients with trademark and copyright litigation, design and
implementation of comprehensive enforcement programs, clearance and portfolio management,
registration strategies, and intellectual property due diligence in corporate transactions.
For more information, go to: https://www.financialpoise.com/webinar-faculty/kristin-garris/
45
About The Faculty
Michael Riela - Riela@thsh.com
Mike Riela is a partner in Tannenbaum Helpernā€™s Creditorsā€™ Rights and Business Reorganization practice.
With more than 15 years of experience, Mike advises companies on complex restructuring, distressed
M&A, loan transactions and bankruptcy related litigation matters. Mike has in-depth experience in
advising clients on corporate and real estate bankruptcies, workouts, Chapter 11 and Chapter 7
bankruptcy cases, debtor-in-possession (DIP) and bankruptcy exit loan facilities, secondary market
trading of distressed debt and trade claims, Section 363 sales and bankruptcy retention and fee
agreements and disputes. His clients include banks, administrative agents, indenture trustees, hedge
funds, private equity firms, professional services firms, trade creditors, contract counterparties,
shareholders, debtors and investors. Mike has represented buyers of assets in Section 363 and out-of-
court sales from sellers such as Evergreen Solar, Inc., Sonic Telecommunications International, Ltd,
Urban Communicators PCS Limited Partnership, US Aggregate, Inc., and Vectrix Corporation, as well as
representing lenders, trustees and administrative agents in major Chapter 11 cases and workouts such
as Delta Air Lines, Inc., Extended Stay Inc., Buffets Inc., Legends Gaming LLC, Nortel Networks, Premier
International Holdings Inc., and many others.
46
Questions or Comments?
If you have any questions about this webinar that you did not get to ask during the live
premiere, or if you are watching this webinar On Demand, please do not hesitate to email us
at info@financialpoise.com with any questions or comments you may have. Please include
the name of the webinar in your email and we will do our best to provide a timely response.
IMPORTANT NOTE: The material in this presentation is for general educational purposes
only. It has been prepared primarily for attorneys and accountants for use in the pursuit of
their continuing legal education and continuing professional education.
47
About Financial Poise
48
Financial Poiseā„¢ has one mission: to provide
reliable plain English business, financial, and legal
education to individual investors, entrepreneurs,
business owners and executives.
Visit us at www.financialpoise.com
Our free weekly newsletter, Financial Poise
Weekly, updates you on new articles published
on our website and Upcoming Webinars you
may be interested in.
To join our email list, please visit:
https://www.financialpoise.com/subscribe/

More Related Content

What's hot

Cloud primer
Cloud primerCloud primer
Cloud primerZeno Idzerda
Ā 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
Ā 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
Ā 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020Christo W. Meyer
Ā 
California Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowCalifornia Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowTokenEx
Ā 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
Ā 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
Ā 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailLance Michalson
Ā 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT worksMorris Dorfer
Ā 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for OpsKamil Rextin
Ā 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
Ā 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentationOvationsGroup
Ā 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Financial Poise
Ā 
Data privacy presentation
Data privacy presentationData privacy presentation
Data privacy presentationTravers Morgan
Ā 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About PrivacyNow Dentons
Ā 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!Now Dentons
Ā 
Be aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationBe aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationLance Michalson
Ā 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
Ā 

What's hot (19)

Cloud primer
Cloud primerCloud primer
Cloud primer
Ā 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Ā 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
Ā 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
Ā 
California Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To KnowCalifornia Consumer Privacy Act - What You Need To Know
California Consumer Privacy Act - What You Need To Know
Ā 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
Ā 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Ā 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
Ā 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
Ā 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
Ā 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for Ops
Ā 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
Ā 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentation
Ā 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Ā 
Data privacy presentation
Data privacy presentationData privacy presentation
Data privacy presentation
Ā 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About Privacy
Ā 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!
Ā 
Be aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationBe aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisation
Ā 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
Ā 

Similar to Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Security: Regulations and Requirements

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
Ā 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
Ā 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
Ā 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to KnowThe Capital Network
Ā 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
Ā 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy ComplianceFinancial Poise
Ā 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
Ā 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
Ā 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
Ā 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityClio - Cloud-Based Legal Technology
Ā 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4danc752
Ā 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
Ā 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
Ā 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)guest95afa8
Ā 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From PplSue Tjernlund
Ā 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Pplsusantj3
Ā 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
Ā 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
Ā 
Privacy Needs to be Personal
Privacy Needs to be PersonalPrivacy Needs to be Personal
Privacy Needs to be PersonalNational University
Ā 

Similar to Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Security: Regulations and Requirements (20)

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Ā 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Ā 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Ā 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
Ā 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
Ā 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Ā 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Ā 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
Ā 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
Ā 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
Ā 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Ā 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
Ā 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Ā 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Ā 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
Ā 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
Ā 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
Ā 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
Ā 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
Ā 
Privacy Needs to be Personal
Privacy Needs to be PersonalPrivacy Needs to be Personal
Privacy Needs to be Personal
Ā 

More from Financial Poise

IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileIP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileFinancial Poise
Ā 
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics  IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics Financial Poise
Ā 
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingTHE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingFinancial Poise
Ā 
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!Financial Poise
Ā 
PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style Financial Poise
Ā 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...Financial Poise
Ā 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
Ā 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...Financial Poise
Ā 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 Financial Poise
Ā 
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...Financial Poise
Ā 
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas Financial Poise
Ā 
BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business Financial Poise
Ā 
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101Financial Poise
Ā 
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts Financial Poise
Ā 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...Financial Poise
Ā 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...Financial Poise
Ā 
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...Financial Poise
Ā 
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsM&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsFinancial Poise
Ā 
M&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessM&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessFinancial Poise
Ā 
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveCROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveFinancial Poise
Ā 

More from Financial Poise (20)

IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileIP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
Ā 
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics  IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
Ā 
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingTHE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
Ā 
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
Ā 
PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style
Ā 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
Ā 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
Ā 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
Ā 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
Ā 
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
Ā 
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
Ā 
BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business
Ā 
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
Ā 
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
Ā 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
Ā 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
Ā 
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
Ā 
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsM&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
Ā 
M&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessM&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A Process
Ā 
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveCROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
Ā 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Ā 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
Ā 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
Ā 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
Ā 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Ā 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
Ā 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
Ā 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...Pooja Nehwal
Ā 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Ā 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
Ā 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
Ā 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
Ā 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
Ā 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Ā 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Ā 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
Ā 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ā 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
Ā 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Ā 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Ā 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
Ā 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
Ā 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...
Ā 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Ā 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Ā 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
Ā 
CĆ³digo Creativo y Arte de Software | Unidad 1
CĆ³digo Creativo y Arte de Software | Unidad 1CĆ³digo Creativo y Arte de Software | Unidad 1
CĆ³digo Creativo y Arte de Software | Unidad 1
Ā 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
Ā 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
Ā 

Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Security: Regulations and Requirements

  • 1. 1
  • 2. 2 Practical and entertaining education for attorneys, accountants, business owners and executives, and investors.
  • 3. 3 Thank You To Our Sponsor
  • 4.
  • 5. Disclaimer The material in this webinar is for informational purposes only. It should not be considered legal, financial or other professional advice. You should consult with an attorney or other appropriate professional to determine what may be best for your individual needs. While Financial Poiseā„¢ takes reasonable steps to ensure that information it publishes is accurate, Financial Poiseā„¢ makes no guaranty in this regard. 5
  • 6. Meet the Faculty MODERATOR: Kathryn Nadro - Sugar Felsenthal Grais & Helsinger LLP PANELISTS: Cassandra Porter - Zuora Kristin Garris - Warshaw Burstein, LLP Michael Riela - Tannenbaum Helpern Syracuse & Hirschtritt LLP 6
  • 7. About This Webinar ā€“ Introduction to US Privacy and Data Security: Regulations and Requirements There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries. This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws. 7
  • 8. About This Series ā€“ Cybersecurity and Data Privacy Data security, data privacy, and cybersecurity are critical issues for your company to consider in todayā€™s business landscape. Data breaches from high profile companies, including law firms, generate worldwide headlines and can severely damage your businessā€™s reputation. In certain industries, a patchwork of state and federal laws and regulations may cover your business, leading to compliance headaches. This series explores the various laws and regulations which govern businesses both in the US and abroad, as well as how to implement and enforce an information security policy to protect your company and limit any damage from a data breach. Each Financial Poise Webinar is delivered in Plain English, understandable to investors, business owners, and executives without much background in these areas, yet is of primary value to attorneys, accountants, and other seasoned professionals. Each episode brings you into engaging, sometimes humorous, conversations designed to entertain as it teaches. Each episode in the series is designed to be viewed independently of the other episodes so that participants will enhance their knowledge of this area whether they attend one, some, or all episodes. 8
  • 9. Episodes in this Series #1: Introduction to US Privacy and Data Security: Regulations and Requirements Premiere date: 9/24/20 #2: Introduction to EU General Data Protection Regulation: Planning, Implementation, and Compliance Premiere date: 10/22/20 #3: How to Build and Implement your Company's Information Security Program Premiere date: 11/19/20 #4: Data Breach Response: Before and After the Breach Premiere date: 12/17/20 9
  • 10. Episode #1 Introduction to US Privacy and Data Security: Regulations and Requirements 10
  • 11. What is Data Security? ā€¢ Confidentiality, availability, and integrity of data ā€¢ All the practices and processes used to protect data from being used or accessed by unauthorized individuals ā€¢ How a company safeguards the data it collects and uses from threats 11
  • 12. What is Data Privacy? ā€¢ The appropriate use of data, including the use of data according to agreed purposes ā€¢ How a company uses the data that it has collected 12
  • 13. What is Personal Information? ā€¢ ā€œpersonally identifiable informationā€ sometimes called ā€œPIIā€ ļƒ¼ Can be linked to a specific individual ļƒ¼ Name, email, full postal address, birth date, SSN, driverā€™s license number, account numbers ā€¢ ā€œnon-personally identifiable informationā€ ļƒ¼ Cannot by itself be used to identify a specific individual ļƒ¼ Aggregate data, zip code, area code, city, state, gender, age 13
  • 14. What is Personal Information? ā€¢ Gray area ā€“ ā€œanonymizedā€ data ļƒ¼ Non-PII that, when linked with other data, can effectively identify a person ļƒ¼ Geolocation data ļƒ¼ Site history and viewing patterns from IP address ļƒ¼ Note: recent rollback of privacy regulation with the FCC? 14
  • 15. Why Do We Need to Protect It? ā€¢ Data is a corporate asset ā€¢ Corporate data is at a higher risk of theft or misuse than ever before ā€¢ Consumers now expect companies to take initiative to protect both security and privacy 15
  • 16. What Must Companies Do to Protect It? ā€¢ Compliance with state, local, federal laws and regulations ļƒ¼ Patchwork of laws developed by sector ļƒ¼ Contrast to Europe, which has a centralized, uniform law ļƒ¼ Makes it difficult to comply when multiple, possibly inconsistent laws apply ā€¢ Contracts with third parties 16
  • 17. What Must Companies Do to Protect It? ā€¢ Privacy policies for website users ļƒ¼ Donā€™t need one if: website is static, is purely B2B, and collects no PII from consumers ļƒ¼ Should cover: o Actual practices for PII and information that reasonably could be associated with a person or device, regarding collection, storage, use, and sharing of info ļƒ¼ Be aware of: financial information, medical information, childrenā€™s information ā€¢ Privacy audits: ļƒ¼ Run them periodically to review and assess policies and practice for data 17
  • 18. What Must Companies Do to Protect It? ā€¢ Your company may have more PII than you are aware of ļƒ¼ For example, if your company gives out commercial loans, it must comply with GLB ļƒ¼ BUT: if you also take guarantees, then you have personal information such as account information, possibly life insurance information, mortgage information, etc. that must be secured ļƒ¼ Have to think more creatively about what types of information you might be collecting o Credit card payments ā€“ have to secure that information 18
  • 19. California Consumer Privacy Act ā€¢ Effective January 1, 2020, companies will have to observe restrictions on data monetization business models, accommodate rights to access, deletion, and porting of personal data, and update privacy policies ā€¢ ā€œConsumersā€ (defined as natural persons who are California residents) have the right to know what personal information a business has collected about them and what it is used for, the right to opt out of allowing a business to sell their personal information to third parties, the right to have a business delete personal information, and the right to receive equal servicing and pricing from a business even if they exercise their privacy rights under the Act. 19
  • 20. California Consumer Privacy Act ā€¢ ā€œpersonal informationā€ is ā€œany information thatā€¦relates toā€¦a particular consumer or householdā€ ļƒ¼ Information about a household may include information like utility bills or pricing ā€¢ Companies must comply if they receive personal data from California residents and they or their parent company or a subsidiary exceed (a) annual gross revenues of $25 million, (b) obtains personal information of 50,000 or more California residents, households or devices annually, or (c) 50 percent or more annual revenue from selling California residentsā€™ personal information. 20
  • 21. California Consumer Privacy Act ā€¢ The Act provides a private right of action that allows consumers to seek, either individually or as a class, statutory or actual damages and injunctive relief, if their sensitive personal information is subject to unauthorized access and exfiltration, theft or disclosure as a result of a businessā€™s failure to implement and maintain reasonable security measures ļƒ¼ Statutory damages can be between $100 and $750 per California resident per incident, or actual damages, whichever is greater 21
  • 22. New York Stop Hacks and Improve Electronic Data Security (ā€œSHIELDā€) Act ā€¢ Expands NY breach notification law and imposes data security program requirements on businesses that possess the private information of New York State residents ā€¢ Applies regardless of whether the businesses have any physical presence in New York State ā€¢ Program requirements include administrative, technical, and physical safeguards for detecting and responding to intrusions and maintaining security of information ā€¢ Businesses subject to and in compliance with Gramm-Leach-Bliley, HIPAA, or the NY Dept. of Financial Services Cybersecurity Requirements are exempted from this requirement under the SHIELD Act ā€¢ Limited reprieve for ā€œsmall businessesā€ with fewer than fifty employees, less than $3 million in gross revenues in the last three fiscal years, or less than $5 million in year-end total assets ā€¢ Expands the definition of ā€œprivate informationā€ subject to NY data breach notification law ā€¢ NY Attorney General can pursue civil penalties, but there is no private right of action 22
  • 23. Massachusetts Standards ā€“ 201 C.M.R. 17 ā€¢ 2010 law ā€“ most protective privacy law in the US at that time ā€¢ Requires every business that licenses or owns personal information of Massachusetts residents to comply with the minimum security standards set forth in the regulation ā€¢ Considered the gold standard ā€¢ Require, when technically feasible, the encryption of personal information stored on portable devices and personal information transmitted across public networks or wirelessly 23
  • 24. Massachusetts Standards ā€“ 201 C.M.R. 17 ā€¢ Requires any natural person or entity that owns or licenses information of a Mass. Resident to implement a written information security program (ā€œWISPā€) with appropriate administrative, technical, and physical safeguards ļƒ¼ Standards must be consistent with those set forth in state and federal regulations to which a business is subject, including data breach notification laws, HIPAA, and the Gramm-Leach-Bliley Act 24
  • 25. Massachusetts Standards ā€“ 201 C.M.R. 17 ā€¢ ā€œpersonal informationā€ ā€“ ā€œa Massachusetts residentā€™s first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driverā€™s license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a residentā€™s financial account.ā€ 25
  • 26. GDPR and the Shrems II Decision ā€¢ New decision from the Court of Justice of the European Union ā€¢ Invalidated the US-EU Privacy Shield ā€¢ Closes off key mechanisms for transferring personal data from the EU to the US ā€¢ Shrems I invalidated European Commission adequacy decisions with respect to EU-U.S. Safe Harbor ā€¢ CJEU was concerned with US government access to personal data for national security purposes and the rights of EU citizens in the US to judicial review and redress ā€¢ CJEU found the U.S. was not according EU personal data the protection and rights of redress available in the EU ā€¢ International data flows can continue to be based on EU Standard Contractual Clauses if properly monitored 26
  • 27. Gramm-Leach-Bliley ā€¢ Overseen by the FTC ļƒ¼ Requires financial institutions (companies that offer consumers financial products or services like loans, financial or investment advice, or insurance) ā€“ to explain their information-sharing practices to their customers and to safeguard sensitive data. ā€¢ The Gramm-Leach-Bliley Act (GLBA) requires financial institutions to provide notice of their privacy policies and practices to their customers, and prohibits financial institutions from disclosing non-public personal information about a consumer to non-affiliated third parties, unless the institutions provide certain information to the consumer and the consumer has not elected to opt out. 27
  • 28. Gramm-Leach-Bliley ā€¢ The GLBA also requires financial institutions to protect the security and confidentiality of their customersā€™ non-public personal information. ā€¢ Regulators (e.g., the Securities and Exchange Commission, the Office of the Comptroller of the Currency, the Federal Reserve and the Commodity Futures Trading Commission) have promulgated rules under the GLBA. 28
  • 29. HIPAA ā€¢ The Health Insurance Portability and Accountability Act (HIPAA) regulates medical information. ā€¢ HIPAA Privacy Rule: ļƒ¼ Requires appropriate safeguards to protect the privacy of ā€œprotected health informationā€ (PHI). ļƒ¼ Sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. ā€¢ Gives patients rights over their health information, including rights to examine and obtain a copy of their health records, and to request corrections. 29
  • 30. HIPAA ā€¢ HIPAA Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of ā€œelectronic protected health informationā€ (ePHI). ā€¢ Privacy Rule and Security Rule are primarily enforced by the U.S. Department of Health & Human Services Office for Civil Rights. 30
  • 31. COPPA ā€¢ Childrenā€™s Online Privacy Protection Act (administered by the FTC) ļƒ¼ Requires parental consent for the collection or use of any personal data for a child under 13 years old ļƒ¼ Requires posting of a privacy policy on the website ļƒ¼ Site operators must permit parental review of any data stored on their child ļƒ¼ Parents are permitted to delete, but not otherwise alter, their childā€™s data 31
  • 32. FTC Act ā€¢ Section 5(a) of the FTC Act prohibits ā€œunfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce.ā€ ā€¢ Under Section 5(n) of FTC Act, the Federal Trade Commission (FTC) may prohibit an act or practice on the grounds that it is ā€œunfair,ā€ if it causes (or is likely to cause) substantial injury to consumers that is: ļƒ¼ Not reasonably avoidable by consumers themselves and ļƒ¼ Not outweighed by countervailing benefits to consumers or to competition. 32
  • 33. FTC Act ā€¢ ā€œunfairā€ if: a practice causes or is likely to cause substantial injury to consumers, cannot be reasonably avoided by consumers, and it is not outweighed by countervailing benefits to consumers or to competition ā€¢ ā€œdeceptiveā€ if: practice misleads, or is likely to mislead, consumers, consumersā€™ interpretation of it is reasonable under circumstances, and it is material ļƒ¼ Examples of deceptive: violating published privacy policies, downloading spyware or adware onto unsuspecting usersā€™ computers, failing to verify identity of persons to whom confidential consumer information was disclosed ļƒ¼ Examples of unfair: failing to implement reasonable safeguards to protect privacy of consumer information 33
  • 34. FTC Act ā€¢ FTC is the main federal regulator in charge of policing privacy and cybersecurity practices among U.S. companies generally. ā€¢ FTC pursues cases against companies for ā€œunfairā€ or ā€œdeceptiveā€ practices, where the company allegedly had inadequate cybersecurity practices, or overstated how comprehensive their privacy and cybersecurity practices were. ā€¢ Consent decrees and settlements often result in monetary damages, and requirements that companies establish rigorous privacy and data security practices (which would be overseen by the FTC). 34
  • 35. CAN-SPAM Act ā€¢ The Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN- SPAM Act) regulates emails that companies send for primarily commercial purposes (e.g., advertisements). ā€¢ Bans false or misleading header information and prohibits deceptive subject lines. ā€¢ Requires that unsolicited commercial email be identified as advertising and allow recipients to opt out of receiving future emails. ā€¢ FTC enforces the CAN-SPAM Act. 35
  • 36. The Telephone Consumer Protection Act (TCPA) ā€¢ Restricts the making of telemarketing calls and the use of automatic telephone dialing systems and artificial or pre-recorded voice messages. ā€¢ TCPA creates a private right of action for consumers, and has been a source of significant class action activity. ā€¢ Federal Communications Commission (FCC) and state attorneys general enforce the TCPA. 36
  • 37. The Fair Credit Reporting Act (As Amended by the Fair and Accurate Credit Transactions Act) Applies to: ā€¢ Consumer reporting agencies (e.g., Equifax, Experian and TransUnion); ā€¢ Companies that use consumer reports (e.g., lenders); and ā€¢ Companies that provide consumer reporting information (e.g., credit card companies). 37
  • 38. State Level Data Breach Laws ā€¢ All 50 states, the District of Columbia, and some U.S. territories have their own data breach notification laws ā€¢ These laws generally require notification of affected individuals and regulators when a company suffers a breach of the security of an individualā€™s personally identifiable information (PII). ā€¢ If a company suffers a data breach involving the PII of customers or employees who are resident in multiple states, it will need to comply with each applicable stateā€™s laws. 38
  • 39. What is a Data Breach? (That May Trigger State Notification Laws) ā€¢ Unauthorized acquisition of PII that compromises the security, confidentiality or integrity of PIIā€¦ ļƒ¼ That results or could result in identity theft or fraud (OH) ļƒ¼ Unless PII is not used or subject to further unauthorized disclosure (NE) ļƒ¼ Unless no misuse of PII has occurred or is not reasonably likely to occur (NJ) ļƒ¼ Unless no reasonable likelihood of harm to consumer whose PII was acquired has resulted or will result (CT) ļƒ¼ That has caused or is likely to cause loss or injury to resident (MI) ļƒ¼ That causes or is reasonably likely to cause substantial economic loss to the individual (AZ) ļƒ¼ Unless no reasonable likelihood of financial harm to consumer whose PII was acquired has resulted or will result (IA) 39
  • 40. Why We Should be Careful with the Word ā€œBreachā€ ā€¢ Using ā€œbreachā€ to describe a data-privacy related incident assumes the incident meets the definition of a security breach which triggers various notification requirements ā€¢ An ā€œincidentā€ does not always rise to the level of ā€œbreachā€ (i.e., encryption safe harbor) ā€¢ ā€œIncidentā€ is better received by the public than ā€œbreachā€ 40
  • 41. Breach Notification Laws ā€¢ State laws differ with respect to: ļƒ¼ Deadline for notifying (14, 30, 45 days; reasonable time) ļƒ¼ Notification to Attorney General ļƒ¼ Notification to other State agencies ļƒ¼ Including Attorney General contact information ļƒ¼ Substitute notice (email, website, media) ļƒ¼ Specific facts of incident and type of PII compromised ļƒ¼ Maintaining records of incident (for 3-5 years) ļƒ¼ Countries also differ with notice requirements 41
  • 43. About The Faculty Kathryn Nadro - knadro@sfgh.com Kathryn (ā€œKatieā€) Nadro advises clients on a diverse array of business matters, including commercial and business disputes, employment issues, and data security and privacy compliance. Katie works with individuals and businesses of all sizes to craft successful resolutions tailored to each individual matter. Katie has broad experience representing companies and individuals in contract, non-compete, discrimination, harassment, fiduciary duty, and trade secret litigation in state and federal court. With a background as both in-house and outside counsel, Katie understands that business objectives, time, and resources play an important role in reaching a favorable outcome for each client. Katie assists clients in navigating employment issues ranging from employee handbooks and FMLA policies to litigating discrimination and harassment claims, all while ensuring business needs and objectives are met. She also counsels clients on data security and privacy issues, including policy drafting and compliance with state, federal, and international law. 43
  • 44. Cassandra Porter - caporter@zuora.com Cassandra M. Porter is the Americas/APAC data privacy lead attorney for a Fortune 100 Tech company working to transform clientsā€™ businesses, operations and technology models for the digital era. She counsels internal clients on privacy-related matters such as data collection practices, online advertising, mobile commerce, along with the development and acquisition of new technology, data incidents and management. Cassandra is a member of the inaugural class of Privacy Law Specialists, a new specialty recognized by the American Bar Association, and a Fellow of Information Privacy by the International Association of Privacy Professionals (IAPP). Her IAPP credentials as a Certified Information Privacy Professional and Certified Information Privacy Manager designate her as thought leader in the field. She is a former co-chair of the IAPPā€™s New Jersey Chapter and member of the Bankruptcy Lawyers Advisory Committee for the District of New Jersey. As a member of the United States Trusteeā€™s Consumer Privacy Ombudsman (CPO) panel, she served as the CPO in the Golfsmith International chapter 11 cases. Previously she was counsel at Lowenstein Sandler LLP where, in addition to assisting clients with data privacy-related issues, she also regularly represented debtors in possession and creditors in chapter 11 matters along with indigents in chapter 7 proceedings in association with the Volunteer Lawyers for Justice. Prior to joining Lowenstein, she clerked for the Honorable Cecelia Morris, United States Bankruptcy Judge for the Southern District of New York and was the Assistant Managing Attorney at Kaye Scholer LLP. 44
  • 45. About The Faculty Kristin Garris - kgarris@wbny.com Kristin G. Garris is a member of Warshaw Burstein, LLP's Intellectual Property practice group who has a broad range of experience in handling matters related to trademark, copyright, Internet, and domain name enforcement and litigation. Ms. Garris counsels clients on a wide range of intellectual property issues, including IP ownership and protection, trademark enforcement and litigation, branding procedures and management, copyright protection, licensing, domain names, privacy policies and website terms of use, IP-related risk management, IP due diligence, data privacy regulations, and much more. She also has significant experience with opposition and cancellation proceedings before the Trademark Trial and Appeal Board of the U.S. Patent and Trademark Office. In addition, Ms. Garris is skilled in representing clients with domain name disputes before the World Intellectual Property Organizationā€™s Arbitration and Mediation Center, as well as a broad range of other Internet-related disputes and trademark and copyright enforcements in connection with social media. With twelve years of experience in intellectual property, Ms. Garris is adept in representing clients with trademark and copyright litigation, design and implementation of comprehensive enforcement programs, clearance and portfolio management, registration strategies, and intellectual property due diligence in corporate transactions. For more information, go to: https://www.financialpoise.com/webinar-faculty/kristin-garris/ 45
  • 46. About The Faculty Michael Riela - Riela@thsh.com Mike Riela is a partner in Tannenbaum Helpernā€™s Creditorsā€™ Rights and Business Reorganization practice. With more than 15 years of experience, Mike advises companies on complex restructuring, distressed M&A, loan transactions and bankruptcy related litigation matters. Mike has in-depth experience in advising clients on corporate and real estate bankruptcies, workouts, Chapter 11 and Chapter 7 bankruptcy cases, debtor-in-possession (DIP) and bankruptcy exit loan facilities, secondary market trading of distressed debt and trade claims, Section 363 sales and bankruptcy retention and fee agreements and disputes. His clients include banks, administrative agents, indenture trustees, hedge funds, private equity firms, professional services firms, trade creditors, contract counterparties, shareholders, debtors and investors. Mike has represented buyers of assets in Section 363 and out-of- court sales from sellers such as Evergreen Solar, Inc., Sonic Telecommunications International, Ltd, Urban Communicators PCS Limited Partnership, US Aggregate, Inc., and Vectrix Corporation, as well as representing lenders, trustees and administrative agents in major Chapter 11 cases and workouts such as Delta Air Lines, Inc., Extended Stay Inc., Buffets Inc., Legends Gaming LLC, Nortel Networks, Premier International Holdings Inc., and many others. 46
  • 47. Questions or Comments? If you have any questions about this webinar that you did not get to ask during the live premiere, or if you are watching this webinar On Demand, please do not hesitate to email us at info@financialpoise.com with any questions or comments you may have. Please include the name of the webinar in your email and we will do our best to provide a timely response. IMPORTANT NOTE: The material in this presentation is for general educational purposes only. It has been prepared primarily for attorneys and accountants for use in the pursuit of their continuing legal education and continuing professional education. 47
  • 48. About Financial Poise 48 Financial Poiseā„¢ has one mission: to provide reliable plain English business, financial, and legal education to individual investors, entrepreneurs, business owners and executives. Visit us at www.financialpoise.com Our free weekly newsletter, Financial Poise Weekly, updates you on new articles published on our website and Upcoming Webinars you may be interested in. To join our email list, please visit: https://www.financialpoise.com/subscribe/