SlideShare a Scribd company logo
1 of 11
Privacy Law Developments Handling the sensitive personal information of others. A high stakes venture.
Hypothetical Your office is broke into and several company files and company computers are stolenā€¦ Sensitive personal information (ā€œSPIā€) of your customers is included in these files/computersā€¦
Bummerā€¦ Legal Problems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Nevada 1.  Current law was enacted on October 1, 2008 and requires that  ā€œa  business in this stateā€ must encrypt personal information of a  customer prior to transmission.  On January 1, 2010 law will be  expanded to also require encryption when data storage devices  containing SPI are moved beyond the physical controls of the  business. 2.  The law does not define ā€œbusiness in this stateā€, nor does it define  ā€œcustomerā€ or ā€œpersonal informationā€.. . so we do not know  whether these definitions are limited to Nevada residents.   Therefore, the law appears very broad on its face. 3.  Encryption is defined broadly  as  ā€œthe use of any protective or  disruptive measure, including, without limitation, cryptography,  enciphering,  encoding or a computer contaminant, to:   A. Prevent, impede, delay or disrupt access to any data, information,  image, program, signal or sound;   B. Cause or make any data, information, image, program, signal or sound  unintelligible or unusable; or   C. Prevent, impede, delay or disrupt the normal operation or use of any  component, device, equipment, system or network.ā€
Connecticut ,[object Object],[object Object],[object Object],[object Object],[object Object]
Massachusetts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks of non-compliance ,[object Object],[object Object],[object Object],[object Object]
Real Risk is the Damage to Brand Image: What is the value of your brandā€™s image? ā€œ I t takes many good deeds to build a good reputation, and only one bad one to lose it.ā€ -Benjamin Franklin
Security Breach = Brand Damage In todayā€™s world, handling peopleā€™s sensitive personal information can be a high stakes venture.
Best Privacy Practices 1. Review the SPI of individuals which you are collecting information from  and the residencies of those individuals. 2. Is it necessary to both collect and store the SPI? Or, to electronically transfer the information? 3. If so, where do you store the SPI? Do you send the SPI to any third parties?  4. Review your Privacy Policy to make sure it is consistent with your business practice of collecting and storing data. 5. Take inventory of how the data is protected.  Should it be encrypted?  6. Do you have a ā€œcomprehensive information security plan?ā€ How about third parties with access to the SPI?
David Mink Dream Systems Media, Owner/Counsel http://www.dreamsystemsmedia.com @dmmink  on Twitter

More Related Content

What's hot

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
Ā 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
Ā 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill Komal Gadia
Ā 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
Ā 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
Ā 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
Ā 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
Ā 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
Ā 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
Ā 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
Ā 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
Ā 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsJulia Mak
Ā 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
Ā 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?Bivas Chatterjee
Ā 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspectiveAnn Treacy
Ā 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
Ā 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
Ā 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
Ā 

What's hot (20)

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
Ā 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
Ā 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
Ā 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Ā 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
Ā 
Data protection act
Data protection act Data protection act
Data protection act
Ā 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Ā 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
Ā 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
Ā 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Ā 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
Ā 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
Ā 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy Regulations
Ā 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
Ā 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?
Ā 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspective
Ā 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
Ā 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
Ā 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Ā 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
Ā 

Similar to Pubcon Privacy Legal Presentation by David Mink

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
Ā 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber lawMahua Narayan
Ā 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
Ā 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
Ā 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
Ā 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
Ā 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
Ā 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
Ā 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
Ā 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
Ā 
Do You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
Ā 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperMatthew Kurnava
Ā 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
Ā 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
Ā 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
Ā 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
Ā 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
Ā 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfRiley Claire
Ā 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
Ā 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
Ā 

Similar to Pubcon Privacy Legal Presentation by David Mink (20)

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
Ā 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
Ā 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
Ā 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
Ā 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Ā 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
Ā 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
Ā 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Ā 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
Ā 
Data Breaches
Data BreachesData Breaches
Data Breaches
Ā 
Do You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: YourĀ Ethical and Legal Duties Regarding Cybersecurity & Privacy
Ā 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Ā 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
Ā 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Ā 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
Ā 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
Ā 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
Ā 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
Ā 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Ā 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
Ā 

More from Matt Siltala

How to create the best content in the world
How to create the best content in the worldHow to create the best content in the world
How to create the best content in the worldMatt Siltala
Ā 
EngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXEngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXMatt Siltala
Ā 
Getting the most milage out of your content marketing
Getting the most milage out of your content marketingGetting the most milage out of your content marketing
Getting the most milage out of your content marketingMatt Siltala
Ā 
Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Matt Siltala
Ā 
Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Matt Siltala
Ā 
Being Influenced - EngagePDX
Being Influenced - EngagePDXBeing Influenced - EngagePDX
Being Influenced - EngagePDXMatt Siltala
Ā 
Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Matt Siltala
Ā 
King of the Brand - State of Search 2016
King of the Brand - State of Search 2016King of the Brand - State of Search 2016
King of the Brand - State of Search 2016Matt Siltala
Ā 
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Matt Siltala
Ā 
The 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingThe 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingMatt Siltala
Ā 
Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Matt Siltala
Ā 
Advanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedAdvanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedMatt Siltala
Ā 
Guide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsGuide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsMatt Siltala
Ā 
How to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingHow to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingMatt Siltala
Ā 
Use visuals and win at social media
Use visuals and win at social mediaUse visuals and win at social media
Use visuals and win at social mediaMatt Siltala
Ā 
Brand Building with Social Media
Brand Building with Social Media Brand Building with Social Media
Brand Building with Social Media Matt Siltala
Ā 
Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Matt Siltala
Ā 
SFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentSFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentMatt Siltala
Ā 
Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Matt Siltala
Ā 
Brand Building with Creative Visual Content
Brand Building with Creative Visual ContentBrand Building with Creative Visual Content
Brand Building with Creative Visual ContentMatt Siltala
Ā 

More from Matt Siltala (20)

How to create the best content in the world
How to create the best content in the worldHow to create the best content in the world
How to create the best content in the world
Ā 
EngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXEngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAX
Ā 
Getting the most milage out of your content marketing
Getting the most milage out of your content marketingGetting the most milage out of your content marketing
Getting the most milage out of your content marketing
Ā 
Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101
Ā 
Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?
Ā 
Being Influenced - EngagePDX
Being Influenced - EngagePDXBeing Influenced - EngagePDX
Being Influenced - EngagePDX
Ā 
Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content
Ā 
King of the Brand - State of Search 2016
King of the Brand - State of Search 2016King of the Brand - State of Search 2016
King of the Brand - State of Search 2016
Ā 
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Ā 
The 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingThe 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content Marketing
Ā 
Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically
Ā 
Advanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedAdvanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX Advanced
Ā 
Guide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsGuide to Local Search Marketing for Contractors
Guide to Local Search Marketing for Contractors
Ā 
How to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingHow to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketing
Ā 
Use visuals and win at social media
Use visuals and win at social mediaUse visuals and win at social media
Use visuals and win at social media
Ā 
Brand Building with Social Media
Brand Building with Social Media Brand Building with Social Media
Brand Building with Social Media
Ā 
Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016
Ā 
SFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentSFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad Content
Ā 
Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide
Ā 
Brand Building with Creative Visual Content
Brand Building with Creative Visual ContentBrand Building with Creative Visual Content
Brand Building with Creative Visual Content
Ā 

Recently uploaded

Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelDeepika Singh
Ā 
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹Bhuvaneswari Subramani
Ā 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
Ā 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
Ā 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
Ā 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
Ā 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
Ā 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
Ā 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
Ā 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
Ā 

Recently uploaded (20)

Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Ā 
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Ā 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Ā 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Ā 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Ā 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Ā 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Ā 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Ā 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Ā 

Pubcon Privacy Legal Presentation by David Mink

  • 1. Privacy Law Developments Handling the sensitive personal information of others. A high stakes venture.
  • 2. Hypothetical Your office is broke into and several company files and company computers are stolenā€¦ Sensitive personal information (ā€œSPIā€) of your customers is included in these files/computersā€¦
  • 3.
  • 4. Nevada 1. Current law was enacted on October 1, 2008 and requires that ā€œa business in this stateā€ must encrypt personal information of a customer prior to transmission. On January 1, 2010 law will be expanded to also require encryption when data storage devices containing SPI are moved beyond the physical controls of the business. 2. The law does not define ā€œbusiness in this stateā€, nor does it define ā€œcustomerā€ or ā€œpersonal informationā€.. . so we do not know whether these definitions are limited to Nevada residents. Therefore, the law appears very broad on its face. 3. Encryption is defined broadly as ā€œthe use of any protective or disruptive measure, including, without limitation, cryptography, enciphering, encoding or a computer contaminant, to: A. Prevent, impede, delay or disrupt access to any data, information, image, program, signal or sound; B. Cause or make any data, information, image, program, signal or sound unintelligible or unusable; or C. Prevent, impede, delay or disrupt the normal operation or use of any component, device, equipment, system or network.ā€
  • 5.
  • 6.
  • 7.
  • 8. Real Risk is the Damage to Brand Image: What is the value of your brandā€™s image? ā€œ I t takes many good deeds to build a good reputation, and only one bad one to lose it.ā€ -Benjamin Franklin
  • 9. Security Breach = Brand Damage In todayā€™s world, handling peopleā€™s sensitive personal information can be a high stakes venture.
  • 10. Best Privacy Practices 1. Review the SPI of individuals which you are collecting information from and the residencies of those individuals. 2. Is it necessary to both collect and store the SPI? Or, to electronically transfer the information? 3. If so, where do you store the SPI? Do you send the SPI to any third parties? 4. Review your Privacy Policy to make sure it is consistent with your business practice of collecting and storing data. 5. Take inventory of how the data is protected. Should it be encrypted? 6. Do you have a ā€œcomprehensive information security plan?ā€ How about third parties with access to the SPI?
  • 11. David Mink Dream Systems Media, Owner/Counsel http://www.dreamsystemsmedia.com @dmmink on Twitter