SlideShare a Scribd company logo
1 of 134
Download to read offline
z
z
presented by Mark B. Manoukian
Securing Sensitive
Personal Data
z
1 Change our perspective
2 Improve our defenses
z
Data Is Valuable
z
Consequences of Data Breach
+ Money
+ Identity Theft
+ Ransom
+ Useful Secrets
+ Punishment
+ Damage to Reputation  Loss of Business
+ Civil Liability
+ Criminal Liability
z
Major Data Breaches of 2015
From http://www.zdnet.com/pictures/worst-largest-security-data-breaches-
2015/
+ Kapersky Labs
+ LastPass
+ CVS, Walgreen’s, Costco
+ Carhone Warehouse (UK)
+ UCLA Health
+ Hacking Team
+ Ashley Madison
+ Anthem
+ IRS
+ Office of Personnel
Management
z
How Did We Get Here?
z
Protecting Our Data in the Old Days
1. Communications were secure in that virtually all
communications were internal.
2. Data was secure in that it was stored on our servers in our
offices.
3. Access is restricted access by usernames and passwords?
4. You had full control over your PC, but it was
inconsequential.
5. Points of entry – desktop PCs in our office – were secure.
6. The only real threat was known viruses attached to e-mail.
7. Our firewall kept uninvited guests out.
8. We were low-value targets.
z
What Has Changed?
z
Communications
+ Employees are able to access our network remotely
across the public Internet.
+ We routinely use 3rd party services, typically web
sites, wherein we are communicating across the
public Internet.
z
Data
+ We store sensitive data of our clients.
+ Third parties store our sensitive data.
z
Points of Entry
+ Home PCs
+ Mobile Devices, Lots of Them
+ Public PCs  Devices
z
Viruses Have Evolved Into
Malware
+ Malware > Viruses.
+ Some malware is indefensible…
+ …in that it attacks flaws in the software that are unknown to
all, including the makers of the software.
+ …sometimes bespoke, just for you.
+ …it piggybacks on other, legit apps or web sites– e.g. Java,
Adobe Flash.
z
Usernames and Passwords
+ Public.
+ Broken.
+ Stolen.
+ Shared.
+ Reused.
z
Net Effect
1. Communications were secure in that virtually all
communications were internal.
2. Data was secure in that it was stored on our servers in our
offices.
3. Access is restricted access by usernames and passwords,
which may be easily broken.
4. You had full control over your PC, but it was
inconsequential.
5. Points of entry – desktop PCs in our office – were secure.
6. The only real threat was known viruses attached to e-mail.
7. Our firewall kept uninvited guests out.
8. We are a high-value low-value target.
z
Order of Events in Hack of RSA, Inc.
Recon
• Research public info about RSA employees
E-Mail
• Create e-mail accounts purporting to be a close friend or employee
Payload
• Payload is an indefensible piece of malware
Malware
• Malware leverages privileges to gain access
Damage
• Data is stolen
z
Recourse?
+ Yes, it’s illegal.
+ Remediation is difficult-to-impossible.
+ Prevention is the best strategy.
z
Action Items For…
+End Users – That’s You
+I.T. Staff
+Firm Management
+Technology Vendors
+Non-Technology Vendors
z
Action Item #1 for Employees:
Don’t let them in by e-mail.
+ Who is the e-mail actually from?
+ If you have to ask me if it is legit then you’ve already
told me that you don’t know this person.
+ Verify by an alternate method.
z
Spear Phishing
z
E-mail may
appear very
genuine
z
Address the
recipient
by name
Use lingo/
jargon of
company
Reference
actual
procedures,
SOPs/TTPs
z
z
Action Item #2: Look for “HTTPS”
Example of a Success
z
Action Item #2: Look for “HTTPS”
Example of a Failure
z
z
Test Yourself on #1 and #2
E-Mail Phishing Quiz:
http://www.sonicwall.com/phishing/
Web Site Phishing Quiz:
https://www.opendns.com/phishing-quiz/
z
Action Item #3: Maintain Your
Software
+ If you didn’t go looking for it then don’t install it.
+ If you installed it, then update it. The vast majority of
patches go to security.
+ If you don’t use it then uninstall it.
z
Action Item #4: Protect Your
Passwords
+ Don’t reuseshare passwords across high-value
accounts.
+ Keep them secure, in a password vault or paper in a
locked drawer in your desk.
+ Not in a Word or Excel document.
z
Action Item #5: Secure Your
Mobile Devices
+ Laptops
+ Smartphones
+ Tablets
+ Fitness gadgets
z
Action Item #6: This is a
mindset.
+ This is a marathon not a sprint.
+ There will be more action items.
+ For the rest of your life.
+ This is a perpetually, quickly moving target.
z
Recurring THEMES
Your PC + data are more valuable than you realize
Person using PC is the weakest link
Phishing is the most common attack vector
Test yourself!
z
Mark B. Manoukian
Director of Information Technology
Kegler Brown Hill + Ritter
mmanoukian@keglerbrown.com
keglerbrown.com/manoukian
614-462-5429
Thank You!
z
Litigation
THEORIES
in Data Breach Litigation
presented by Luis M. Alcalde
z
Why COMPANIES
Get Sued
z
Lost or stolen
computers containing
PII or SPI
z
Payment card
system hacking
z
Theft of financial
data hacking
z
Unknown intrusions
z
Publication of
personal information
z
Suits by banks against
corporate hacking
victim to recover cost
z
LEGAL PITFALLS
POTENTIAL
Was it preventable?
z
LEGAL PITFALLS
POTENTIAL
Was it preventable?Federal + 50 state disclosure requirements
z
LEGAL PITFALLS
POTENTIAL
Federal + 50 state disclose requirementsPublic reporting to SEC + federal/state agencies
z
Applicable U.S. Law
+ No common set of laws
governing civil liability
+ Claimants use patchwork
of federal and state
statutory claims +
common law claims
z
Federal Statutes
Health Insurance
Portability and
Accountability
Act (HIPPA)
Health Information
Technology for
Economic and
Clinical Health
Act (HITECH)
Stored
Communications
Act (SCA)
Fair Credit
Reporting
Act (FCRA)
Graham-Leach-Bliley
Act (GLBA)
z
State Law Claims
Consumer protection statutes
Unfair trade practices statutes
Negligence
Invasion of privacy
Breach of implied or express contract
Unjust enrichment
z
Standing + Injury Requirement
Need to establish injury in-fact to support Article III
standing in federal court (biggest impediment so far)
Concrete + particularized
Actual + imminent, not conjectural or hypothetical
Possible future injury not enough
Threatened injury must be impending
Plaintiffs often allege risk of future injury + expenses
to mitigate that risk
z
RISK of Future
Harm is Obstacle to
Consumer Cases
z
Lack of evidence of what
happened to the PII
Lack of evidence of financial
loss or proof of identity theft
Lack of loss because claimants
were reimbursed within
payment card system
Federal courts dismiss on mere
possibility of future harm
Plaintiff’s principal theory of
harm is risk that loss of PII puts
at higher risk of identity theft
Some district courts have found
standing on facts falling short
of actual financial harm
z
Mitigation
EXPENSES
Need to mitigate against
fraud + identity theft
Purchasing credit
monitoring services
Purchasing identity
theft insurance
z
re Sony Gaming Networks
…996 F. Supp 2d 942
(S.D. Cal. 2014)
April 2011: hackers attacked computer network
used to provide Sony PlayStation Network (PSN)
and related networks
z
re Sony Gaming Networks
…996 F.Supp 2d 942
(S.D. Cal. 2014)
Lawsuit claims that Sony did not adequately
protect networks and hackers were able to
access certain account holder information
z
re Sony Gaming Networks
…996 F.Supp 2d 942
(S.D. Cal. 2014)
Claims were that hackers stole information to
commit fraud and identity theft + account holders
were legally injured by the unavailability of the
network while temporarily off-line for 24 days
z
California D.C. court found
plaintiffs alleged sufficient
facts of “impending injury”
z
Alternative Theories of Harm
Lost time +
inconvenience
Emotional
distress
Decreased
economic
value of PII
Denied benefit
of the bargain
z
STATUTORY DAMAGES
z
STATE COURTS
EASIER?
z
Class Certification
HURDLE
z
AGAINST CLASS
CERTIFICATOIN
z
Suits by Banks + Financial Institutions
z
Luis M. Alcalde, Of Counsel
Kegler Brown Hill + Ritter
lalcalde@keglerbrown.com
keglerbrown.com/alcalde
614-462-5480
Thank You!
z
z
presented by Larry J. McClatchey
Understanding Secured Transactions +
Consignments
SECURING PAYMENT
z
Pre-pay or COD
Traditional Means
to Secure Payment
Letters of Credit
Guarantee
Liens in Seller’s Favor
z
Obstacles to Securing Payment
+ Type of Goods
+ Seller’s Existing Credit Terms + Conditions
+ Buyer’s Existing Credit Terms + Conditions
+ PO + Supply Agreements
z
UCC – Nationwide Rules for
Commerce
+ Rules for Sales + Leases
+ Banking, Checks + Letters of Credit
+ Procedures for Warehouse Receipts + Bills of Lading
+ Agreement to Grant Security to Seller
z
Not All Transactions +
Collateral Covered
Secured Transactions
Under Article 9
Classification of Collateral
z
Security Agreements
+ Identifies Parties
+ Buyer Grants Security Interest
+ Describes Collateral
+ Specific listing
+ Category of Goods
+ Type of Goods
+ Include Proceeds and Products of Collateral
+ Specifies Indebtedness to be Secured
z
Attachment of
Security Interests
+ Value given by creditor
+ Debtor has rights in collateral
+ Authenticated Security Agreement
1
Formal Requirements
z
Perfection of Security
Interest
+ Possession
+ Control
+ Perfection by Filing
2
z
Filing Rules
+ Name of Individual Debtor
+ Name of Registered Organization
+ Place of Filing
+ Changes in Name or Location
+ Sufficient description of Collateral
3
z
Basic Rules of Priority
+ First to File or Perfect
+ Filing Before Loan Closing
+ Lapse in Filing
4
z
The Purchase Money
Security Interest
A PMSI is distinguished from a standard security
interest in two main ways: its manner of creation
and the priority it receives relative to other
security interests in the same collateral.
z
Collateral Subject to PMSI:
+ Goods
+ Software
+ Consignor’s Inventory
The Purchase Money
Security Interest
z
The Purchase Money
Security Interest
Priority of PMSI:
+ Goods other than inventory
+ Inventory
z
The Purchase Money
Security Interest
“Superior Priority Status”:
+ Security Interest in Favor of Seller
+ Cost of Purchase of Collateral
z
The Purchase Money
Security Interest
Limitations on PMSI:
+ Notice of Conflicting Inventory
+ Prior Secured Party
z
Consignments
z
True Consignment Characteristics
+ Generally consumer goods
+ Value of goods less than $1000.
+ Delivered to merchant for sale
+ Merchant/auctioneer known to sell on consignment
+ Usually subject to state bailment law
z
UCC “Consignment”
Characteristics
+ Merchant deals with goods other than under
consignor’s name
+ Merchant is not an auctioneer
+ Not generally known as reseller
+ Aggregate value of goods over $1000
+ Inapplicable to consumer goods
+ Transaction does not create a security
interest to secure an obligation.
z
Common Commercial
“Consignment”
+ Security for payment of an obligation
+ Consignment of goods treated as PMSI in inventory
+ Rights between consignor and consignee unimpaired
+ Several practical problems with consignments
z
Priority of Consignor’s Claim
Dependent on Perfection
+ Priority over floating inventory lien
+ Must create and perfect as PMSI
+ Financing statement and notice
z
Practical Problems in Securing
Payment Under UCC
+ Transactional Costs
+ Change of Name of Debtor
+ Mergers/Successor Debtor
+ Remedies Upon Default
+ Disposition of Recovered Collateral
z
Issues to Consider
+ What Agreements in Effect Already?
+ Eligible for Statutory Lien?
+ Would PMSI Be Effective?
+ Do We Sell Type of Goods Suitable for Security
Agreement?
+ Practical Problems with Collateral?
z
Thank You!
Larry J. McClatchey, Director
Kegler Brown Hill + Ritter
lmcclatchey@keglerbrown.com
keglerbrown.com/mcclatchey
614-462-5463
z
Understanding +
DEFENDING
Preference Claims
presented by Christy A. Prince
z
What is a Preference?
Payment or transfer made during the
ninety days prior to bankruptcy
Debtor makes a payment or payments
to some creditors and not to others
90
z
Purpose of Preference Law?
Prevent “piecemeal” dismemberment of a debtor
Avoid the “race to the court house” among creditors
To promote equal distribution among creditors
similarly situated
z
Who Can Avoid a
Preferential Transfer?
1
Bankruptcy trustee or
“debtor in possession”
2
Representative of Liquidating
Trust in chapter 11 case
z
Elements of a
Preference Claim
Transfer of
property of
a debtor
To or for
benefit of
creditor
On account
of an
antecedent
debt
Made while
debtor was
insolvent
Enables creditor
to receive more
than if transfer
had not been
made
Within 90
days prior to
bankruptcy
z
Element: A Transfer
Must be of
the debtor’s
property
z
Element: A Transfer
Typically
from debtor
to creditor
z
Element: A Transfer
Could be
payment
from debtor
to third-
party
z
+ Debtor owes Creditor, and Creditor owes ABC Company
+ Debtor pays ABC Company for Creditor’s debt in
consideration of Debtor’s debt to Creditor
+ Debtor can recover the transfer from Creditor
z
+ Creditor applies credit for damaged goods to Debtor’s
account, reducing amount due from Debtor to Creditor
+ Application of credit to Debtor’s account is not a transfer
for the benefit of Creditor
+ Review records of alleged preferential transfers to weed
out credits
z
Element: Antecedent Debt
Transfer
must be on
account of
preexisting
debt
z
Element: Antecedent Debt
If payment
terms are
Cash on
Delivery, no
antecedent
debt
z
Element: Antecedent Debt
If payment
terms are
paying old
invoices, there
is antecedent
debt
z
Element: Time Span
If creditor is an
insider, preference
period is one year
prior to bankruptcy
petition date
z
Element: Time Span
If creditor is not an
insider, preference
period is 90 days
prior to bankruptcy
petition date
z
Element: Debtor’s Insolvency
Transfer must
have been
made while
debtor was
insolvent
z
Element: Debtor’s Insolvency
Insolvency is
presumed for
the 90 days
prior to
bankruptcy
z
Element: Debtor’s Insolvency
Creditor can
introduce
evidence that
debtor was
solvent at time
of transfer
z
Element: Debtor’s Insolvency
If bankruptcy
filed suddenly
after
meaningful
event, explore
this element
z
Element: Creditor Receives More
Disputes over this
element are rare
z
Element: Creditor Receives More
If debt fully secured
by collateral,
transfer didn’t allow
creditor to obtain
more than it would
have in bankruptcy
z
Element: Creditor Receives More
If creditors will be
paid in full through
bankruptcy, this
element would not
be met
z
Debtor/trustee must prove each
element of preference
Burden of proof for elements is
on debtor/trustee
Creditor can establish an
“affirmative defense”
Creditor has burden of proof on
any affirmative defense
Defense Considerations
z
Ordinary Course of
Business Defense
Encourages creditors to deal with companies on
“normal” credit terms
z
Ordinary Course of
Business Defense
The debt was incurred in the ordinary course of the business
between debtor and creditor, AND:
EITHER
Payment is made in the ordinary course of business
of the debtor and the transferee
OR
Payment is made according to
ordinary business terms in the industry
z
Ordinary Course of Business
Between the Parties
Payment that is “normal” in parties’
course of dealing
Consistency with other business
transactions between parties
Examines course of conduct + payment
history prior to filing
Historical period v. preference period
Consistency late payments may qualify
as ordinary payments
z
Payment NOT in Subjective
Ordinary Course of Business
Creditor requires a cashier’s check for the first time
Creditor imposes new terms during the preference period
Payment results from coercive collection practices
Creditor imposes or threatens credit hold
z
Ordinary Business Terms:
Objective Ordinary Course
Payment is “ordinary” in relation to
the relevant industry standard
Examine industry as a whole
Explore practices common to
similarly situated businesses
Usually requires expert testimony
z
Potential
PROBLEMS
with OCB
z
Subsequent New Value
Defense
Creditor may have replenished the value of Debtor
by continuing to supply goods/services
z
Subsequent New Value
Transfer by creditor after payment received
Not secured by “otherwise unavoidable” security interest
On account of which new value debtor did not make
an otherwise unavoidable transfer to or benefit of creditor
New value determined as of petition date,
so post-petition payments are not relevant
z
May not be available if
Creditor retains a
security interest
May not be available if
Debtor later paid for the
new goods prior to the
petition date
Subsequent New Value
z
+ June 1: Debtor pays Creditor $200,000
+ June 15: Creditor ships new goods on credit
+ August 1: Debtor files bankruptcy
+ Zero preference exposure because of SNV
+ Creditor has a proof of claim for $200,000
z
+ June 1: Debtor owes creditor $500,000
+ June 15: Debtor pays creditor $200,000
+ June 30: Creditor ships new goods ($100,000) on credit
+ August 1: Debtor files bankruptcy
+ $100,000 preference exposure because of SNV
+ Creditor has a proof of claim for $400,000
z
+ June 1: Creditor ships new goods ($200,000) on credit
+ June 15: Debtor pays creditor $200,000
+ August 1: Debtor files bankruptcy
+ $200,000 preference exposure
z
TIMING
of the Claim
z
Preparing for the
DEFENSE
z
Transfer <$5,000 in business cases<$5000
Amount in controversy
Case filed too late (statute of limitations)
Transfer to holder of unperfected lien rights
Other Potential Defenses
+
Transfer <$600 in consumer cases <$600
z
Where is the lawsuit filed?
When was the lawsuit filed?
How much is the claim?
Did the debtor make the transfer?
Checklist of Defenses
Against Preference Claims
z
Checklist of Defenses
Against Preference Claims
Do lien rights exist? PMSI?
Did debtor receive “20 day goods”?
Has debtor made “critical vendor” offer?
Section 503(b)(9) bargaining chip?
z
TIPS
Practical
z
Review your invoices
to compare to
industry standards
z
Stay consistent in
your collection
practices
z
If a problem customer
files bankruptcy,
work up defenses
while fresh
z
Preserve all records
of collection
communications
z
Don’t ignore a
demand letter
z
Christy A. Prince, Director
Kegler Brown Hill + Ritter
cprince@keglerbrown.com
keglerbrown.com/prince
614-462-5444
Thank You!
z

More Related Content

What's hot

How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
Massachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws PresentationMassachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws Presentationbillanetworks
 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...dmenken60
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information InfrastructureJay McLaughlin
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013- Mark - Fullbright
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious CrimeTanzim Rizwan
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Cyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security ForensicsCyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security Forensicsbtr-security
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceJoseph Brunsman
 

What's hot (20)

How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Massachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws PresentationMassachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws Presentation
 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
Hacking3e ppt ch15
Hacking3e ppt ch15Hacking3e ppt ch15
Hacking3e ppt ch15
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013
 
Identity theft
Identity theftIdentity theft
Identity theft
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
Hacking3e ppt ch01
Hacking3e ppt ch01Hacking3e ppt ch01
Hacking3e ppt ch01
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Cyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security ForensicsCyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security Forensics
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber Insurance
 
Hacking3e ppt ch09
Hacking3e ppt ch09Hacking3e ppt ch09
Hacking3e ppt ch09
 

Viewers also liked

A Picture Is Worth Thousand Words
A Picture Is Worth Thousand WordsA Picture Is Worth Thousand Words
A Picture Is Worth Thousand WordsSuren Kumar
 
Пропозиція PR-агенції "Автограф"
Пропозиція PR-агенції "Автограф"Пропозиція PR-агенції "Автограф"
Пропозиція PR-агенції "Автограф"autograf_comm
 
Eyeblaster Research Note Cpc Curtail The Growth Display Advertising
Eyeblaster Research Note Cpc Curtail The Growth Display AdvertisingEyeblaster Research Note Cpc Curtail The Growth Display Advertising
Eyeblaster Research Note Cpc Curtail The Growth Display AdvertisingEyeblaster Spain
 
Persdev asr
Persdev asrPersdev asr
Persdev asrchander3
 
Where to focus event innovation? - An audience led approach
Where to focus event innovation? - An audience led approachWhere to focus event innovation? - An audience led approach
Where to focus event innovation? - An audience led approachLive Union
 
2013 ucdavis-smbe-eukaryotes
2013 ucdavis-smbe-eukaryotes2013 ucdavis-smbe-eukaryotes
2013 ucdavis-smbe-eukaryotesc.titus.brown
 
وظائف القيادة
وظائف القيادةوظائف القيادة
وظائف القيادةAhmad Darwish
 
How to convert a file to Portable Document format (PDF)?
How to convert a file to Portable Document format (PDF)?How to convert a file to Portable Document format (PDF)?
How to convert a file to Portable Document format (PDF)?jessecadelina
 
Cross-Border Transactions from a U.S. Perspective
Cross-Border Transactions from a U.S. PerspectiveCross-Border Transactions from a U.S. Perspective
Cross-Border Transactions from a U.S. PerspectiveKegler Brown Hill + Ritter
 
Ejemplo completo de integración JLex y CUP
Ejemplo completo de integración JLex y CUPEjemplo completo de integración JLex y CUP
Ejemplo completo de integración JLex y CUPEgdares Futch H.
 

Viewers also liked (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
A Picture Is Worth Thousand Words
A Picture Is Worth Thousand WordsA Picture Is Worth Thousand Words
A Picture Is Worth Thousand Words
 
2014 villefranche
2014 villefranche2014 villefranche
2014 villefranche
 
Пропозиція PR-агенції "Автограф"
Пропозиція PR-агенції "Автограф"Пропозиція PR-агенції "Автограф"
Пропозиція PR-агенції "Автограф"
 
Eyeblaster Research Note Cpc Curtail The Growth Display Advertising
Eyeblaster Research Note Cpc Curtail The Growth Display AdvertisingEyeblaster Research Note Cpc Curtail The Growth Display Advertising
Eyeblaster Research Note Cpc Curtail The Growth Display Advertising
 
18 Di Concetta
18 Di Concetta18 Di Concetta
18 Di Concetta
 
2012 oslo-talk
2012 oslo-talk2012 oslo-talk
2012 oslo-talk
 
TLC History
TLC HistoryTLC History
TLC History
 
Autograf_comm_f
Autograf_comm_fAutograf_comm_f
Autograf_comm_f
 
Persdev asr
Persdev asrPersdev asr
Persdev asr
 
Where to focus event innovation? - An audience led approach
Where to focus event innovation? - An audience led approachWhere to focus event innovation? - An audience led approach
Where to focus event innovation? - An audience led approach
 
2013 ucdavis-smbe-eukaryotes
2013 ucdavis-smbe-eukaryotes2013 ucdavis-smbe-eukaryotes
2013 ucdavis-smbe-eukaryotes
 
2015 pycon-talk
2015 pycon-talk2015 pycon-talk
2015 pycon-talk
 
وظائف القيادة
وظائف القيادةوظائف القيادة
وظائف القيادة
 
How to convert a file to Portable Document format (PDF)?
How to convert a file to Portable Document format (PDF)?How to convert a file to Portable Document format (PDF)?
How to convert a file to Portable Document format (PDF)?
 
Cross-Border Transactions from a U.S. Perspective
Cross-Border Transactions from a U.S. PerspectiveCross-Border Transactions from a U.S. Perspective
Cross-Border Transactions from a U.S. Perspective
 
Ejemplo completo de integración JLex y CUP
Ejemplo completo de integración JLex y CUPEjemplo completo de integración JLex y CUP
Ejemplo completo de integración JLex y CUP
 
Breve Historia
Breve HistoriaBreve Historia
Breve Historia
 
RealTimeStudio
RealTimeStudioRealTimeStudio
RealTimeStudio
 
Exporting to India: Strategies for Success
Exporting to India: Strategies for SuccessExporting to India: Strategies for Success
Exporting to India: Strategies for Success
 

Similar to 2016 legal seminar for credit professionals

2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - Columbus2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - ColumbusKegler Brown Hill + Ritter
 
2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - Cleveland2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - ClevelandKegler Brown Hill + Ritter
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentationShanonNasoni
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Xtandit_Marketing
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19ArielMcCurdy
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdfDrysign By Exela
 

Similar to 2016 legal seminar for credit professionals (20)

2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - Columbus2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - Columbus
 
2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - Cleveland2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - Cleveland
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
techalpha07
techalpha07techalpha07
techalpha07
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentation
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
 

More from Kegler Brown Hill + Ritter

2023 Managing Labor + Employee Relations Seminar
2023 Managing Labor + Employee Relations Seminar2023 Managing Labor + Employee Relations Seminar
2023 Managing Labor + Employee Relations SeminarKegler Brown Hill + Ritter
 
The Future of Work - A Pandemic Transformation of the Workplace.pdf
The Future of Work - A Pandemic Transformation of the Workplace.pdfThe Future of Work - A Pandemic Transformation of the Workplace.pdf
The Future of Work - A Pandemic Transformation of the Workplace.pdfKegler Brown Hill + Ritter
 
2022 Managing Labor + Employee Relations Seminar
2022 Managing Labor + Employee Relations Seminar2022 Managing Labor + Employee Relations Seminar
2022 Managing Labor + Employee Relations SeminarKegler Brown Hill + Ritter
 
2021 Managing Labor + Employee Relations Seminar
2021 Managing Labor + Employee Relations Seminar2021 Managing Labor + Employee Relations Seminar
2021 Managing Labor + Employee Relations SeminarKegler Brown Hill + Ritter
 
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...Key Legal + Business Issues - Navigating Complexities in Doing Business in th...
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...Kegler Brown Hill + Ritter
 
Ohio's Medical Marijuana Business From a Legal Perspective
Ohio's Medical Marijuana Business From a Legal PerspectiveOhio's Medical Marijuana Business From a Legal Perspective
Ohio's Medical Marijuana Business From a Legal PerspectiveKegler Brown Hill + Ritter
 
The Impact of Medical Marijuana in Ohio Workplaces
The Impact of Medical Marijuana in Ohio WorkplacesThe Impact of Medical Marijuana in Ohio Workplaces
The Impact of Medical Marijuana in Ohio WorkplacesKegler Brown Hill + Ritter
 
Grow + Sell Your Business Part Four: Employee Incentives
Grow + Sell Your Business Part Four: Employee IncentivesGrow + Sell Your Business Part Four: Employee Incentives
Grow + Sell Your Business Part Four: Employee IncentivesKegler Brown Hill + Ritter
 
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a Transaction
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a TransactionGrow + Sell Your Business Part Three: Practical Tips To Facilitate a Transaction
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a TransactionKegler Brown Hill + Ritter
 
Grow + Sell Your Business Part Two: IP Protections
Grow + Sell Your Business Part Two: IP ProtectionsGrow + Sell Your Business Part Two: IP Protections
Grow + Sell Your Business Part Two: IP ProtectionsKegler Brown Hill + Ritter
 
Grow + Sell Your Business Part One: Organizational Structures
Grow + Sell Your Business Part One: Organizational StructuresGrow + Sell Your Business Part One: Organizational Structures
Grow + Sell Your Business Part One: Organizational StructuresKegler Brown Hill + Ritter
 

More from Kegler Brown Hill + Ritter (20)

2023 Managing Labor + Employee Relations Seminar
2023 Managing Labor + Employee Relations Seminar2023 Managing Labor + Employee Relations Seminar
2023 Managing Labor + Employee Relations Seminar
 
Booming City Seminar.pdf
Booming City Seminar.pdfBooming City Seminar.pdf
Booming City Seminar.pdf
 
The Future of Work - A Pandemic Transformation of the Workplace.pdf
The Future of Work - A Pandemic Transformation of the Workplace.pdfThe Future of Work - A Pandemic Transformation of the Workplace.pdf
The Future of Work - A Pandemic Transformation of the Workplace.pdf
 
2022 Managing Labor + Employee Relations Seminar
2022 Managing Labor + Employee Relations Seminar2022 Managing Labor + Employee Relations Seminar
2022 Managing Labor + Employee Relations Seminar
 
2021 Managing Labor + Employee Relations Seminar
2021 Managing Labor + Employee Relations Seminar2021 Managing Labor + Employee Relations Seminar
2021 Managing Labor + Employee Relations Seminar
 
2020 LGBTQ SCOTUS Ruling
2020 LGBTQ SCOTUS Ruling2020 LGBTQ SCOTUS Ruling
2020 LGBTQ SCOTUS Ruling
 
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...Key Legal + Business Issues - Navigating Complexities in Doing Business in th...
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...
 
Medical Marijuana Law in Ohio
Medical Marijuana Law in OhioMedical Marijuana Law in Ohio
Medical Marijuana Law in Ohio
 
Legalized Marijuana - Impact on Cities
Legalized Marijuana - Impact on CitiesLegalized Marijuana - Impact on Cities
Legalized Marijuana - Impact on Cities
 
The Impact of Legalized Marijuana
The Impact of Legalized MarijuanaThe Impact of Legalized Marijuana
The Impact of Legalized Marijuana
 
Medical Marijuana in the Ohio Workplace
Medical Marijuana in the Ohio WorkplaceMedical Marijuana in the Ohio Workplace
Medical Marijuana in the Ohio Workplace
 
Ohio's Medical Marijuana Business From a Legal Perspective
Ohio's Medical Marijuana Business From a Legal PerspectiveOhio's Medical Marijuana Business From a Legal Perspective
Ohio's Medical Marijuana Business From a Legal Perspective
 
2020 Kegler Brown Labor Seminar
2020 Kegler Brown Labor Seminar2020 Kegler Brown Labor Seminar
2020 Kegler Brown Labor Seminar
 
The Impact of Medical Marijuana in Ohio Workplaces
The Impact of Medical Marijuana in Ohio WorkplacesThe Impact of Medical Marijuana in Ohio Workplaces
The Impact of Medical Marijuana in Ohio Workplaces
 
Grow + Sell Your Business Part Four: Employee Incentives
Grow + Sell Your Business Part Four: Employee IncentivesGrow + Sell Your Business Part Four: Employee Incentives
Grow + Sell Your Business Part Four: Employee Incentives
 
2019 Ethics Symposium
2019 Ethics Symposium2019 Ethics Symposium
2019 Ethics Symposium
 
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a Transaction
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a TransactionGrow + Sell Your Business Part Three: Practical Tips To Facilitate a Transaction
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a Transaction
 
2019 Employment Concerns in the Gig Economy
2019 Employment Concerns in the Gig Economy2019 Employment Concerns in the Gig Economy
2019 Employment Concerns in the Gig Economy
 
Grow + Sell Your Business Part Two: IP Protections
Grow + Sell Your Business Part Two: IP ProtectionsGrow + Sell Your Business Part Two: IP Protections
Grow + Sell Your Business Part Two: IP Protections
 
Grow + Sell Your Business Part One: Organizational Structures
Grow + Sell Your Business Part One: Organizational StructuresGrow + Sell Your Business Part One: Organizational Structures
Grow + Sell Your Business Part One: Organizational Structures
 

Recently uploaded

如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 

Recently uploaded (20)

如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 

2016 legal seminar for credit professionals

  • 1. z
  • 2. z presented by Mark B. Manoukian Securing Sensitive Personal Data
  • 3. z 1 Change our perspective 2 Improve our defenses
  • 5. z Consequences of Data Breach + Money + Identity Theft + Ransom + Useful Secrets + Punishment + Damage to Reputation Loss of Business + Civil Liability + Criminal Liability
  • 6. z Major Data Breaches of 2015 From http://www.zdnet.com/pictures/worst-largest-security-data-breaches- 2015/ + Kapersky Labs + LastPass + CVS, Walgreen’s, Costco + Carhone Warehouse (UK) + UCLA Health + Hacking Team + Ashley Madison + Anthem + IRS + Office of Personnel Management
  • 7. z How Did We Get Here?
  • 8. z Protecting Our Data in the Old Days 1. Communications were secure in that virtually all communications were internal. 2. Data was secure in that it was stored on our servers in our offices. 3. Access is restricted access by usernames and passwords? 4. You had full control over your PC, but it was inconsequential. 5. Points of entry – desktop PCs in our office – were secure. 6. The only real threat was known viruses attached to e-mail. 7. Our firewall kept uninvited guests out. 8. We were low-value targets.
  • 10. z Communications + Employees are able to access our network remotely across the public Internet. + We routinely use 3rd party services, typically web sites, wherein we are communicating across the public Internet.
  • 11. z Data + We store sensitive data of our clients. + Third parties store our sensitive data.
  • 12. z Points of Entry + Home PCs + Mobile Devices, Lots of Them + Public PCs Devices
  • 13. z Viruses Have Evolved Into Malware + Malware > Viruses. + Some malware is indefensible… + …in that it attacks flaws in the software that are unknown to all, including the makers of the software. + …sometimes bespoke, just for you. + …it piggybacks on other, legit apps or web sites– e.g. Java, Adobe Flash.
  • 14. z Usernames and Passwords + Public. + Broken. + Stolen. + Shared. + Reused.
  • 15. z Net Effect 1. Communications were secure in that virtually all communications were internal. 2. Data was secure in that it was stored on our servers in our offices. 3. Access is restricted access by usernames and passwords, which may be easily broken. 4. You had full control over your PC, but it was inconsequential. 5. Points of entry – desktop PCs in our office – were secure. 6. The only real threat was known viruses attached to e-mail. 7. Our firewall kept uninvited guests out. 8. We are a high-value low-value target.
  • 16. z Order of Events in Hack of RSA, Inc. Recon • Research public info about RSA employees E-Mail • Create e-mail accounts purporting to be a close friend or employee Payload • Payload is an indefensible piece of malware Malware • Malware leverages privileges to gain access Damage • Data is stolen
  • 17. z Recourse? + Yes, it’s illegal. + Remediation is difficult-to-impossible. + Prevention is the best strategy.
  • 18. z Action Items For… +End Users – That’s You +I.T. Staff +Firm Management +Technology Vendors +Non-Technology Vendors
  • 19. z Action Item #1 for Employees: Don’t let them in by e-mail. + Who is the e-mail actually from? + If you have to ask me if it is legit then you’ve already told me that you don’t know this person. + Verify by an alternate method.
  • 22. z Address the recipient by name Use lingo/ jargon of company Reference actual procedures, SOPs/TTPs
  • 23. z
  • 24. z Action Item #2: Look for “HTTPS” Example of a Success
  • 25. z Action Item #2: Look for “HTTPS” Example of a Failure
  • 26. z
  • 27. z Test Yourself on #1 and #2 E-Mail Phishing Quiz: http://www.sonicwall.com/phishing/ Web Site Phishing Quiz: https://www.opendns.com/phishing-quiz/
  • 28. z Action Item #3: Maintain Your Software + If you didn’t go looking for it then don’t install it. + If you installed it, then update it. The vast majority of patches go to security. + If you don’t use it then uninstall it.
  • 29. z Action Item #4: Protect Your Passwords + Don’t reuseshare passwords across high-value accounts. + Keep them secure, in a password vault or paper in a locked drawer in your desk. + Not in a Word or Excel document.
  • 30. z Action Item #5: Secure Your Mobile Devices + Laptops + Smartphones + Tablets + Fitness gadgets
  • 31. z Action Item #6: This is a mindset. + This is a marathon not a sprint. + There will be more action items. + For the rest of your life. + This is a perpetually, quickly moving target.
  • 32. z Recurring THEMES Your PC + data are more valuable than you realize Person using PC is the weakest link Phishing is the most common attack vector Test yourself!
  • 33. z Mark B. Manoukian Director of Information Technology Kegler Brown Hill + Ritter mmanoukian@keglerbrown.com keglerbrown.com/manoukian 614-462-5429 Thank You!
  • 34. z Litigation THEORIES in Data Breach Litigation presented by Luis M. Alcalde
  • 36. z Lost or stolen computers containing PII or SPI
  • 41. z Suits by banks against corporate hacking victim to recover cost
  • 43. z LEGAL PITFALLS POTENTIAL Was it preventable?Federal + 50 state disclosure requirements
  • 44. z LEGAL PITFALLS POTENTIAL Federal + 50 state disclose requirementsPublic reporting to SEC + federal/state agencies
  • 45. z Applicable U.S. Law + No common set of laws governing civil liability + Claimants use patchwork of federal and state statutory claims + common law claims
  • 46. z Federal Statutes Health Insurance Portability and Accountability Act (HIPPA) Health Information Technology for Economic and Clinical Health Act (HITECH) Stored Communications Act (SCA) Fair Credit Reporting Act (FCRA) Graham-Leach-Bliley Act (GLBA)
  • 47. z State Law Claims Consumer protection statutes Unfair trade practices statutes Negligence Invasion of privacy Breach of implied or express contract Unjust enrichment
  • 48. z Standing + Injury Requirement Need to establish injury in-fact to support Article III standing in federal court (biggest impediment so far) Concrete + particularized Actual + imminent, not conjectural or hypothetical Possible future injury not enough Threatened injury must be impending Plaintiffs often allege risk of future injury + expenses to mitigate that risk
  • 49. z RISK of Future Harm is Obstacle to Consumer Cases
  • 50. z Lack of evidence of what happened to the PII Lack of evidence of financial loss or proof of identity theft Lack of loss because claimants were reimbursed within payment card system Federal courts dismiss on mere possibility of future harm Plaintiff’s principal theory of harm is risk that loss of PII puts at higher risk of identity theft Some district courts have found standing on facts falling short of actual financial harm
  • 51. z Mitigation EXPENSES Need to mitigate against fraud + identity theft Purchasing credit monitoring services Purchasing identity theft insurance
  • 52. z re Sony Gaming Networks …996 F. Supp 2d 942 (S.D. Cal. 2014) April 2011: hackers attacked computer network used to provide Sony PlayStation Network (PSN) and related networks
  • 53. z re Sony Gaming Networks …996 F.Supp 2d 942 (S.D. Cal. 2014) Lawsuit claims that Sony did not adequately protect networks and hackers were able to access certain account holder information
  • 54. z re Sony Gaming Networks …996 F.Supp 2d 942 (S.D. Cal. 2014) Claims were that hackers stole information to commit fraud and identity theft + account holders were legally injured by the unavailability of the network while temporarily off-line for 24 days
  • 55. z California D.C. court found plaintiffs alleged sufficient facts of “impending injury”
  • 56. z Alternative Theories of Harm Lost time + inconvenience Emotional distress Decreased economic value of PII Denied benefit of the bargain
  • 61. z Suits by Banks + Financial Institutions
  • 62. z Luis M. Alcalde, Of Counsel Kegler Brown Hill + Ritter lalcalde@keglerbrown.com keglerbrown.com/alcalde 614-462-5480 Thank You!
  • 63. z
  • 64. z presented by Larry J. McClatchey Understanding Secured Transactions + Consignments SECURING PAYMENT
  • 65. z Pre-pay or COD Traditional Means to Secure Payment Letters of Credit Guarantee Liens in Seller’s Favor
  • 66. z Obstacles to Securing Payment + Type of Goods + Seller’s Existing Credit Terms + Conditions + Buyer’s Existing Credit Terms + Conditions + PO + Supply Agreements
  • 67. z UCC – Nationwide Rules for Commerce + Rules for Sales + Leases + Banking, Checks + Letters of Credit + Procedures for Warehouse Receipts + Bills of Lading + Agreement to Grant Security to Seller
  • 68. z Not All Transactions + Collateral Covered Secured Transactions Under Article 9 Classification of Collateral
  • 69. z Security Agreements + Identifies Parties + Buyer Grants Security Interest + Describes Collateral + Specific listing + Category of Goods + Type of Goods + Include Proceeds and Products of Collateral + Specifies Indebtedness to be Secured
  • 70. z Attachment of Security Interests + Value given by creditor + Debtor has rights in collateral + Authenticated Security Agreement 1 Formal Requirements
  • 71. z Perfection of Security Interest + Possession + Control + Perfection by Filing 2
  • 72. z Filing Rules + Name of Individual Debtor + Name of Registered Organization + Place of Filing + Changes in Name or Location + Sufficient description of Collateral 3
  • 73. z Basic Rules of Priority + First to File or Perfect + Filing Before Loan Closing + Lapse in Filing 4
  • 74. z The Purchase Money Security Interest A PMSI is distinguished from a standard security interest in two main ways: its manner of creation and the priority it receives relative to other security interests in the same collateral.
  • 75. z Collateral Subject to PMSI: + Goods + Software + Consignor’s Inventory The Purchase Money Security Interest
  • 76. z The Purchase Money Security Interest Priority of PMSI: + Goods other than inventory + Inventory
  • 77. z The Purchase Money Security Interest “Superior Priority Status”: + Security Interest in Favor of Seller + Cost of Purchase of Collateral
  • 78. z The Purchase Money Security Interest Limitations on PMSI: + Notice of Conflicting Inventory + Prior Secured Party
  • 80. z True Consignment Characteristics + Generally consumer goods + Value of goods less than $1000. + Delivered to merchant for sale + Merchant/auctioneer known to sell on consignment + Usually subject to state bailment law
  • 81. z UCC “Consignment” Characteristics + Merchant deals with goods other than under consignor’s name + Merchant is not an auctioneer + Not generally known as reseller + Aggregate value of goods over $1000 + Inapplicable to consumer goods + Transaction does not create a security interest to secure an obligation.
  • 82. z Common Commercial “Consignment” + Security for payment of an obligation + Consignment of goods treated as PMSI in inventory + Rights between consignor and consignee unimpaired + Several practical problems with consignments
  • 83. z Priority of Consignor’s Claim Dependent on Perfection + Priority over floating inventory lien + Must create and perfect as PMSI + Financing statement and notice
  • 84. z Practical Problems in Securing Payment Under UCC + Transactional Costs + Change of Name of Debtor + Mergers/Successor Debtor + Remedies Upon Default + Disposition of Recovered Collateral
  • 85. z Issues to Consider + What Agreements in Effect Already? + Eligible for Statutory Lien? + Would PMSI Be Effective? + Do We Sell Type of Goods Suitable for Security Agreement? + Practical Problems with Collateral?
  • 86. z Thank You! Larry J. McClatchey, Director Kegler Brown Hill + Ritter lmcclatchey@keglerbrown.com keglerbrown.com/mcclatchey 614-462-5463
  • 88. z What is a Preference? Payment or transfer made during the ninety days prior to bankruptcy Debtor makes a payment or payments to some creditors and not to others 90
  • 89. z Purpose of Preference Law? Prevent “piecemeal” dismemberment of a debtor Avoid the “race to the court house” among creditors To promote equal distribution among creditors similarly situated
  • 90. z Who Can Avoid a Preferential Transfer? 1 Bankruptcy trustee or “debtor in possession” 2 Representative of Liquidating Trust in chapter 11 case
  • 91. z Elements of a Preference Claim Transfer of property of a debtor To or for benefit of creditor On account of an antecedent debt Made while debtor was insolvent Enables creditor to receive more than if transfer had not been made Within 90 days prior to bankruptcy
  • 92. z Element: A Transfer Must be of the debtor’s property
  • 94. z Element: A Transfer Could be payment from debtor to third- party
  • 95. z + Debtor owes Creditor, and Creditor owes ABC Company + Debtor pays ABC Company for Creditor’s debt in consideration of Debtor’s debt to Creditor + Debtor can recover the transfer from Creditor
  • 96. z + Creditor applies credit for damaged goods to Debtor’s account, reducing amount due from Debtor to Creditor + Application of credit to Debtor’s account is not a transfer for the benefit of Creditor + Review records of alleged preferential transfers to weed out credits
  • 97. z Element: Antecedent Debt Transfer must be on account of preexisting debt
  • 98. z Element: Antecedent Debt If payment terms are Cash on Delivery, no antecedent debt
  • 99. z Element: Antecedent Debt If payment terms are paying old invoices, there is antecedent debt
  • 100. z Element: Time Span If creditor is an insider, preference period is one year prior to bankruptcy petition date
  • 101. z Element: Time Span If creditor is not an insider, preference period is 90 days prior to bankruptcy petition date
  • 102. z Element: Debtor’s Insolvency Transfer must have been made while debtor was insolvent
  • 103. z Element: Debtor’s Insolvency Insolvency is presumed for the 90 days prior to bankruptcy
  • 104. z Element: Debtor’s Insolvency Creditor can introduce evidence that debtor was solvent at time of transfer
  • 105. z Element: Debtor’s Insolvency If bankruptcy filed suddenly after meaningful event, explore this element
  • 106. z Element: Creditor Receives More Disputes over this element are rare
  • 107. z Element: Creditor Receives More If debt fully secured by collateral, transfer didn’t allow creditor to obtain more than it would have in bankruptcy
  • 108. z Element: Creditor Receives More If creditors will be paid in full through bankruptcy, this element would not be met
  • 109. z Debtor/trustee must prove each element of preference Burden of proof for elements is on debtor/trustee Creditor can establish an “affirmative defense” Creditor has burden of proof on any affirmative defense Defense Considerations
  • 110. z Ordinary Course of Business Defense Encourages creditors to deal with companies on “normal” credit terms
  • 111. z Ordinary Course of Business Defense The debt was incurred in the ordinary course of the business between debtor and creditor, AND: EITHER Payment is made in the ordinary course of business of the debtor and the transferee OR Payment is made according to ordinary business terms in the industry
  • 112. z Ordinary Course of Business Between the Parties Payment that is “normal” in parties’ course of dealing Consistency with other business transactions between parties Examines course of conduct + payment history prior to filing Historical period v. preference period Consistency late payments may qualify as ordinary payments
  • 113. z Payment NOT in Subjective Ordinary Course of Business Creditor requires a cashier’s check for the first time Creditor imposes new terms during the preference period Payment results from coercive collection practices Creditor imposes or threatens credit hold
  • 114. z Ordinary Business Terms: Objective Ordinary Course Payment is “ordinary” in relation to the relevant industry standard Examine industry as a whole Explore practices common to similarly situated businesses Usually requires expert testimony
  • 116. z Subsequent New Value Defense Creditor may have replenished the value of Debtor by continuing to supply goods/services
  • 117. z Subsequent New Value Transfer by creditor after payment received Not secured by “otherwise unavoidable” security interest On account of which new value debtor did not make an otherwise unavoidable transfer to or benefit of creditor New value determined as of petition date, so post-petition payments are not relevant
  • 118. z May not be available if Creditor retains a security interest May not be available if Debtor later paid for the new goods prior to the petition date Subsequent New Value
  • 119. z + June 1: Debtor pays Creditor $200,000 + June 15: Creditor ships new goods on credit + August 1: Debtor files bankruptcy + Zero preference exposure because of SNV + Creditor has a proof of claim for $200,000
  • 120. z + June 1: Debtor owes creditor $500,000 + June 15: Debtor pays creditor $200,000 + June 30: Creditor ships new goods ($100,000) on credit + August 1: Debtor files bankruptcy + $100,000 preference exposure because of SNV + Creditor has a proof of claim for $400,000
  • 121. z + June 1: Creditor ships new goods ($200,000) on credit + June 15: Debtor pays creditor $200,000 + August 1: Debtor files bankruptcy + $200,000 preference exposure
  • 124. z Transfer <$5,000 in business cases<$5000 Amount in controversy Case filed too late (statute of limitations) Transfer to holder of unperfected lien rights Other Potential Defenses + Transfer <$600 in consumer cases <$600
  • 125. z Where is the lawsuit filed? When was the lawsuit filed? How much is the claim? Did the debtor make the transfer? Checklist of Defenses Against Preference Claims
  • 126. z Checklist of Defenses Against Preference Claims Do lien rights exist? PMSI? Did debtor receive “20 day goods”? Has debtor made “critical vendor” offer? Section 503(b)(9) bargaining chip?
  • 128. z Review your invoices to compare to industry standards
  • 129. z Stay consistent in your collection practices
  • 130. z If a problem customer files bankruptcy, work up defenses while fresh
  • 131. z Preserve all records of collection communications
  • 133. z Christy A. Prince, Director Kegler Brown Hill + Ritter cprince@keglerbrown.com keglerbrown.com/prince 614-462-5444 Thank You!
  • 134. z