SlideShare a Scribd company logo
1 of 14
Data and Cyber Security Risks
Data and Cyber Security Risks
Best Practices for Protection and Response
September 29, 2016
Dan Michaluk
Data and Cyber Security Risks
Dan Michaluk I Partner, Toronto
Data and Cyber Security Risks
The claims context
3
Data and Cyber Security Risks
The claims context
2012 • Lost HD with PI of student loan recipients (Condon)
2012 • Unauthorized access to medical records (Hopkins)
2014 •Medical marijuana mis-mailing (Doe)
2014 • Payment card theft (Home Depot)
2015 • Ashley Madison extortion affair (Avid Life)
4
Data and Cyber Security Risks
The claims context
5
BIG LEGAL ISSUES
Is a victimized custodian liable
when its loss of data has not
caused “compensable damages”?
Creative counsel say “yes.” Courts say maybe.
 Intrusion upon seclusion and “recklessness”
 Contractual breach and nominal damages
 Waiver of tort
Is an organization vicariously liable
for an employee’s (intentional)
unauthorized use?
Creative counsel say “yes.” Courts say maybe.
 This is a policy issue that needs to be litigated on good
facts
 We have one preliminary court decision considering the
issue and one arbitrator who said “no” to vicarious liability
Data and Cyber Security Risks
The claims context
• PIPEDA breach notification a game changer
• "Breach of security safeguards" – loss, unauthorized
access, disclosure
• When there is a "real risk of significant harm"
• Notification and reporting to individual, to the OPC and to
organizations in a position to mitigate
• All "as soon as feasible"
6
Data and Cyber Security Risks
What’s really at stake?
Potential liability? Other costs and losses
Not all damages are compensable Professional fees (PR, IT, Legal)
Moral damages are capped Notification costs (mailing, call centre)
Will class counsel be rewarded? Business interruption and lost productivity
Reputational harm, lost business and
stakeholder management problems
7
Data and Cyber Security Risks
BIG corporate data risks (and top defences)
8
• Background screening, network monitoringRogues
• Employee awareness and training, intrusion
detectionPhishing
• Safe options, clear rules, clear enforcementGhost IT
• Balanced BYOD policyMobile
Data and Cyber Security Risks
The incident response process
Identify Contain Remedy Close
9
Data and Cyber Security Risks
Incident response best practices - timing
10
Initiate ASAP
Keep the ball in motion
Don't rush
Data and Cyber Security Risks
Incident response best practices - analysis
11
Assume only as necessary
Obtain objective input
Obtain technical input
Data and Cyber Security Risks
Incident response best practices - communication
12
Take a broad view of notification
Put yourself in their shoes
Demonstrate commitment to
doing better
Data and Cyber Security Risks
Questions & Answers
Data and Cyber Security Risks
Data and Cyber Security Risks
Best Practices for Protection and Response
September 29, 2016
Dan Michaluk

More Related Content

What's hot

Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Paul C. Van Slyke
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 

What's hot (20)

Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 

Similar to Cas cyber prez

2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
VITNetflix
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb
 

Similar to Cas cyber prez (20)

Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Treat Cyber Like a Disease
Treat Cyber Like a DiseaseTreat Cyber Like a Disease
Treat Cyber Like a Disease
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 

More from Dan Michaluk

Cacuss 2015 sexual violence
Cacuss 2015 sexual violenceCacuss 2015 sexual violence
Cacuss 2015 sexual violence
Dan Michaluk
 

More from Dan Michaluk (18)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and Practice
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
 
Privacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updatePrivacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal update
 
Cacuss 2015 sexual violence
Cacuss 2015 sexual violenceCacuss 2015 sexual violence
Cacuss 2015 sexual violence
 
Responding to Data Breaches
Responding to Data BreachesResponding to Data Breaches
Responding to Data Breaches
 

Recently uploaded

一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
bd2c5966a56d
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
F La
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
Airst S
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 

Recently uploaded (20)

一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 

Cas cyber prez

  • 1. Data and Cyber Security Risks Data and Cyber Security Risks Best Practices for Protection and Response September 29, 2016 Dan Michaluk
  • 2. Data and Cyber Security Risks Dan Michaluk I Partner, Toronto
  • 3. Data and Cyber Security Risks The claims context 3
  • 4. Data and Cyber Security Risks The claims context 2012 • Lost HD with PI of student loan recipients (Condon) 2012 • Unauthorized access to medical records (Hopkins) 2014 •Medical marijuana mis-mailing (Doe) 2014 • Payment card theft (Home Depot) 2015 • Ashley Madison extortion affair (Avid Life) 4
  • 5. Data and Cyber Security Risks The claims context 5 BIG LEGAL ISSUES Is a victimized custodian liable when its loss of data has not caused “compensable damages”? Creative counsel say “yes.” Courts say maybe.  Intrusion upon seclusion and “recklessness”  Contractual breach and nominal damages  Waiver of tort Is an organization vicariously liable for an employee’s (intentional) unauthorized use? Creative counsel say “yes.” Courts say maybe.  This is a policy issue that needs to be litigated on good facts  We have one preliminary court decision considering the issue and one arbitrator who said “no” to vicarious liability
  • 6. Data and Cyber Security Risks The claims context • PIPEDA breach notification a game changer • "Breach of security safeguards" – loss, unauthorized access, disclosure • When there is a "real risk of significant harm" • Notification and reporting to individual, to the OPC and to organizations in a position to mitigate • All "as soon as feasible" 6
  • 7. Data and Cyber Security Risks What’s really at stake? Potential liability? Other costs and losses Not all damages are compensable Professional fees (PR, IT, Legal) Moral damages are capped Notification costs (mailing, call centre) Will class counsel be rewarded? Business interruption and lost productivity Reputational harm, lost business and stakeholder management problems 7
  • 8. Data and Cyber Security Risks BIG corporate data risks (and top defences) 8 • Background screening, network monitoringRogues • Employee awareness and training, intrusion detectionPhishing • Safe options, clear rules, clear enforcementGhost IT • Balanced BYOD policyMobile
  • 9. Data and Cyber Security Risks The incident response process Identify Contain Remedy Close 9
  • 10. Data and Cyber Security Risks Incident response best practices - timing 10 Initiate ASAP Keep the ball in motion Don't rush
  • 11. Data and Cyber Security Risks Incident response best practices - analysis 11 Assume only as necessary Obtain objective input Obtain technical input
  • 12. Data and Cyber Security Risks Incident response best practices - communication 12 Take a broad view of notification Put yourself in their shoes Demonstrate commitment to doing better
  • 13. Data and Cyber Security Risks Questions & Answers
  • 14. Data and Cyber Security Risks Data and Cyber Security Risks Best Practices for Protection and Response September 29, 2016 Dan Michaluk

Editor's Notes

  1. Note: This is our widescreen format template (our new Firm standard going forward). If you require regular screen width, click on the Office Button, select ‘New’ and select the Regular Template. If there is only 1 presenter, delete the red barrier line and ‘presenter 2’
  2. DELETE this slide if not required This optional SubTitle Slide is designed to include a photo of the Presenter. To change the picture, click on the picture Icon. The folder contains all of the cropped lawyer photos – alphabetized by last name. Double click on the desired photo to insert into this slide.
  3. -we are in a new risk environment today -you can draw a few conclusions from this slide -data security makes headlines – daily (Yahoo – today) -threat has evolved -lost USB key (Durham Region) -state sponsored hacking (Sony – The Interview) -so people are talking about the importance of data security today -whether they are walking is a different question -but there’s a general recognition that companies must prioritize the risk
  4. Here’s another view of the evolving context, this time by looking at class actions -Condon – lost HD – simply lost – could go nowhere -Hopkins – snooping into records -Doe – mail to person with medial access marijuana program -recent development in that case I’ll tell you about in a moment -Home Depot – lost USB, settled, class counsel denied full fee -Ashley Madison – sensational, contract claim Actions do happen 1000 breaches a day in Canada Should be able to manage a typical breach without getting targeted (Hide in the noise) In a sense that’s the goal Some comfort that each of these is special
  5. Let’s talk a little bit about the law …. -two types of claims – type A and type B -in a transition time – courts are trying to figure out what to do about them -type A is the negligent loss of data (including hacking scenarios) -like condon -every day -no harm no foul rule -compensable damages -” serious and prolonged and rise above the ordinary annoyances, anxieties and fears that people living in society routinely, if sometimes reluctantly, accept” -try to get around it -doe the court said no –limited to costs incurred to prevent home invasion, costs incurred for other personal security, damage to reputation, loss of employment, reduced capacity for employment, and out of pocket expenses -not Lozanski too -type B is intentional -more serious -question is whether the bad acting employee is liable alone -or whether the employer can be liable for the employee’s actions -no authoritative law yet -potential exposure is real
  6. -there’s an important statutory change coming, likely in mid-2017 -breach notification under PIPEDA -real risk of significant harm -two parts -risk has to be above a standard -potential for harm has to be above a standard -will be interpreted with a view to protection -does not apply to your core activity -but – there’s an expectation of notification that will be solidified -different than even five years ago -notification invites a whole world of pain that we’ll talk about -so notification invites better data security – that’s the policy
  7. -keep this in mind -arbitrator recently ordered an employer to pay damages for conducting an unauthorized breathalyser test -how much? -$200 -risk of actual pecuniary harm is remote -moral damages limited to intentional – capped and meant to be modest -Lozanski now – courts will question actions for type A claims … -professional fees -small breach taken seriously -$15,000 in legal fees -mailing – 65,000 person breach -85 cents a letter -time and effort, business interruption from hacks -reputation and lost business … -keep that in mind -talk about response in a bit -it’s a softer problem than it might feel -can afford to take risks in your messaging
  8. -this is the one slide on prevention -before we talk about response, let me say that it all starts with prevention -four program requirements -supported by top management -adequately resourced -risk based (no such thing as perfect security) -evolves and stays current -here’s the risks that I regularly see
  9. -go to response -general process – linear but there can and should be itterations -identify -can’t sit within your organization -need to get them to a single POC -who typically escalates to a IRT -contain -get it back, close the vulnerability… -priority number one -remedy -geared at preventing harm -notification is only one tactic – not everything -close -learning loop -causal analysis -debrief the process itself
  10. -timing is everything! -when did it happen? -when did you find out? -why you telling us now? -three tips on timing -initiate ASAP -pressure to improve network detection capability -once a human knows >>> POC -policy that has a clear rule -keep the ball in motion -never sit on this -ever… -but don’t rush -clock speed concept (harm, who knows, who is likely to know) -work in accordance with clock speed -gather as much information as you can afford to gather before making decision
  11. -great pressure, but think don’t react -notify the regulator before they contact me -tips on better analysis -watch your assumption -e.g. the person who did it was trained? -obtain objective input -breach coaches -two phenomenon, pull in opposite directions -a) guilt -b) wishful thinking -obtain technical input -what happened -to whom -when -why -not if it’s a human factor problem -but if it requires IT analysis to understand
  12. -communication – so much rests on communication -themes >>> transparency >>> ownership (admit responsibility, not necessarily liability) -tips -take a broad view -not every breach requires notification -more and more expected -even when there’s not a real risk of financial harm -consider that… consider reputation -consider … will they find out anyway? -put yourself in their shoes -anxious -what questions -demonstrate commitment to doing better -avoid simplistic root cause analysis -there’s always something systemic going on -push towards that -if the breach is bad… push further -if the relationship with the regulator is bad… push further
  13. DELETE this slide if not required
  14. Note: This is our widescreen format template (our new Firm standard going forward). If you require regular screen width, click on the Office Button, select ‘New’ and select the Regular Template. If there is only 1 presenter, delete the red barrier line and ‘presenter 2’