SlideShare a Scribd company logo
212.804.7041
nance@nschicklaw.com
CYBERSECURITY:
IS THERE ANY SUCH THING?
This educational seminar will teach funeral professionals the basics of protecting their confidential and
private data—to the best of their abilities—when using devices connected to the Internet. This will
allow them to: a) define conflicts that arise between best and actual practices, b) identify the affected
parties and their interests, c) take preventative action (where possible), and d) respond appropriately
to errors.
Contact hours: 2 Law
When attended continuously and in full, this 100-minute course provides the professional one credit
hour. See Pub. Health Law §3429.
Course Outline
I. Introduction of Speaker and Presentation Goals
A. Nance L. Schick, Esq.
1. Funeral IndustryAttorneywithalargelyvirtual practice
2. EmployerwithTwoPart-Time Employees,one of whichworksvirtuallyfromAZ
3. BusinessOwnerwithSevenPerDiemAttorneyVendors(independentbusinessownerswhoalsowork
virtually)
4. FormerEarly Adopterof TechnologyInnovations
B. Disclaimer
Thiscourse providesageneral overviewof cybersecurityconcernsandhow theymightaffectyourwork. It is
not legal advice, and I am not your attorney. If you require informationoradvice appliedtoyourunique
situation,pleasemake anappointmenttodiscussitwithanexperiencedattorneyof yourchoosing.
C. Presentation Goals
212.804.7041
nance@nschicklaw.com
1. Define conflictsthatarise betweenbestandactual practices
2. Identifythe affectedpartiesandtheirinterests
3. Take preventative action(where possible)
4. Respondappropriatelytoerrors
II. Introduction of Topic and Key Presentation Points
NOT SO FUN FACT: Forty-three percent of cyberattacks are aimed at small businesses.
https://thebestvpn.com/cyber-security-statistics-2018/.
A. You have duties to protect the confidentiality and privacy of certain data.
1. Businessprocessesandotherintellectualproperty protectedundercopyright,trademark,orpatent
law
2. Decedents’healthrecords,if notidentityandotherdetails
3. Families’creditcard,bankaccount, or otherinformation
4. Employees’socialsecuritynumbers,immigrantstatus,residence information,healthinformation,
and more
NOT SO FUN FACT: More than 4,000 ransomware attacks occur every day.
https://thebestvpn.com/cyber-security-statistics-2018/.
B. Things can go wrong quickly.
1. Patco Constr.Co.Inc. v. People’sUnitedBank (1stCir.July2012). Patco wasa typical mid-sized
businesscustomerof the bank.Itregularlywithdrew moneyto payemployees’wages andvendor
invoices.Hackersinstalledmalware onPatco’scomputersandstole moneyfromitsbankaccounts.
Despite seeingthe large off-shore withdrawal(whichwasunusual forthe business),the bank
managerapprovedthe transaction,overridinganalert.He determinedthatthe log-inidentification
and passwordcombinationweresufficient,soPatco’sbackaccountwas drained.Patcosuedthe
bank.The court rejectedthe argumentthatthe bankmanagerwas negligent.Onappeal,the court
reversedandremandedthe case fora trial to determine,amongotherthings,if the bankhadtaken
appropriate cautionstosafeguardPatco’sinformation.The case settledbefore trial.
2. Federal Trade Commissionv.WyndhamWorldwideCorporation (3dCir. 2015). Aftera security
breach,the Federal Trade Commissionfiledacivil actionagainst Wyndam, allegingthatthe
212.804.7041
nance@nschicklaw.com
corporationmisledthe publicaboutcybersecuritypoliciesitcouldn’tkeep.The FTCwonan
injunctionthatdirected,amongotherthingsimprovedrecordkeepingandcompliancemonitoring.
3. Galaria v.Nationwide Mut.Ins.Co.,2016 U.S. App.LEXIS 16840 (6th Cir.2016). Nationwide’s
computernetworkwashacked,exposing sensitive personal information,suchas names,datesof
birth,marital statuses,genders,occupations,employers,Social Securitynumbers,anddriver’s
license numbersof more thana millionpeople. A classactionlawsuitwasfiled,due tothe
“increasedriskof fraud”and expensesincurredinmitigatingthe riskof fraud,suchas purchasing
creditreports,creditmonitoringservices,andothermitigationproducts. (Thecase haseithersettled
or is still pending.)
NOT SOFUN FACT: Seventy-eightpercentof people reporttheyknow the risksof clickinglinksinE-mail
messagesfromunknownsources,buttheystillclickonthem. https://thebestvpn.com/cyber-security-
statistics-2018/.
C. You must protect yourself, your business, and your clients.
1. Take an inventoryof the potential vulnerabilitiesinyoursystems.
2. Discussthe vulnerabilitiesandpotential protectionswithyouremployees.
3. Facilitate aculture that takescybersecurity seriously,ensuringyouhave writtenprocedures
regarding:
a) the use of E-mail,social media,the Internet, websites,software, andpersonal devicesforwork
b) notice of potential malware,ransomware,orothercyberattacks
c) limitationsonaccessto workaccounts anddevices
i. Vendors
ii. Independentcontractors
iii. Familymembers
iv. Friends
v. Clients
vi. General public
d) confidentialityandprivacy
4. Considerretainingoutsideconsultantstoevaluate yourrisks.
5. Ensure that yourDirectors’and Officers’ (D&O) andbusiness insurancecoversdatabreachlawsuits.
212.804.7041
nance@nschicklaw.com
III. Review of Key Presentation Points
A. You have duties to protect the confidentiality and privacy of certain data. You know the basics.
The primary thing that has changed is the form of the data, which makes it more vulnerable to
theft. Get protection.
B. Things can go wrong quickly. You and your employees need to know what to do about malware,
ransomware, and other data breaches. Get training.
C. You must protect yourself, your business, and your clients. Get disciplined.
IV. Questions
A. Did you define a few conflicts between the best practices and ones you currently have in your
funeral homes?
B. Can you identify who is affected by these conflicts and therefore who you need to talk to?
C. Did you learn of at least three preventative actions you can take in the next month to reduce
your risk of a cybersecurity attack?
D. Do you feel like you can respond appropriately to errors, if something bad happens?
V. Thank you
Speaker Biography
Nance L. Schick, Esq. is an attorney, arbitrator, and mediator based in NewYork City. She is the founder of
The Law Studio of Nance L. Schick, a largely virtual workshop, where clients can partner with conflict
resolution professionals who are also licensed to practice law. She has been representing a multi-national
funeral home corporation since 2004, and she has been teaching continuing education courses in the funeral
industry since 2012.She is an award-winning entrepreneur, who has been acknowledged by the NewYork
Economic Development Corporation/B-Labs (Finalist, Best for NYC 2015 & 2016), U.S. Chamber of
Commerce (2015 Blue Ribbon Small Business),Enterprising Women Magazine (Honorable Mention, 2014
Woman of the Year awards), and Urban Rebound NY/Count Me In (Finalist, 2013 Pitch Competition).

More Related Content

Similar to Cybersecurity Continuing Education Course Outline

How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
SecurityMetrics
 
Cyber liability insurance and your security program
Cyber liability insurance and your security programCyber liability insurance and your security program
Cyber liability insurance and your security program
Scott Takaoka
 
Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.
Tonya Jackson
 
Submit to Assignment Folder.Purpose The purpose of this.docx
Submit to Assignment Folder.Purpose The purpose of this.docxSubmit to Assignment Folder.Purpose The purpose of this.docx
Submit to Assignment Folder.Purpose The purpose of this.docx
james891
 
How To Lay Out A History Essay - Writingfixya.Web.Fc
How To Lay Out A History Essay - Writingfixya.Web.FcHow To Lay Out A History Essay - Writingfixya.Web.Fc
How To Lay Out A History Essay - Writingfixya.Web.Fc
Sandra Anderson
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
- Mark - Fullbright
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Clio - Cloud-Based Legal Technology
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
Strategy&, a member of the PwC network
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
Richard Brzakala
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
Nehal Madhani
 
Chalkboard Writing Quotes. QuotesGram
Chalkboard Writing Quotes. QuotesGramChalkboard Writing Quotes. QuotesGram
Chalkboard Writing Quotes. QuotesGram
Erin Ross
 
Example Essay Grade 9
Example Essay Grade 9Example Essay Grade 9
Example Essay Grade 9
Trina Locklear
 
Iapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersIapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And Answers
Armstrongsmith
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
EKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEDDY KOVACEVICH
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Netpluz Asia Pte Ltd
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
Rosa Williams
 

Similar to Cybersecurity Continuing Education Course Outline (20)

How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
Cyber liability insurance and your security program
Cyber liability insurance and your security programCyber liability insurance and your security program
Cyber liability insurance and your security program
 
Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.
 
Submit to Assignment Folder.Purpose The purpose of this.docx
Submit to Assignment Folder.Purpose The purpose of this.docxSubmit to Assignment Folder.Purpose The purpose of this.docx
Submit to Assignment Folder.Purpose The purpose of this.docx
 
How To Lay Out A History Essay - Writingfixya.Web.Fc
How To Lay Out A History Essay - Writingfixya.Web.FcHow To Lay Out A History Essay - Writingfixya.Web.Fc
How To Lay Out A History Essay - Writingfixya.Web.Fc
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Cyber
Cyber Cyber
Cyber
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
Chalkboard Writing Quotes. QuotesGram
Chalkboard Writing Quotes. QuotesGramChalkboard Writing Quotes. QuotesGram
Chalkboard Writing Quotes. QuotesGram
 
Example Essay Grade 9
Example Essay Grade 9Example Essay Grade 9
Example Essay Grade 9
 
Iapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersIapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And Answers
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
EKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IP
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
 

Recently uploaded

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 

Recently uploaded (20)

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 

Cybersecurity Continuing Education Course Outline

  • 1. 212.804.7041 nance@nschicklaw.com CYBERSECURITY: IS THERE ANY SUCH THING? This educational seminar will teach funeral professionals the basics of protecting their confidential and private data—to the best of their abilities—when using devices connected to the Internet. This will allow them to: a) define conflicts that arise between best and actual practices, b) identify the affected parties and their interests, c) take preventative action (where possible), and d) respond appropriately to errors. Contact hours: 2 Law When attended continuously and in full, this 100-minute course provides the professional one credit hour. See Pub. Health Law §3429. Course Outline I. Introduction of Speaker and Presentation Goals A. Nance L. Schick, Esq. 1. Funeral IndustryAttorneywithalargelyvirtual practice 2. EmployerwithTwoPart-Time Employees,one of whichworksvirtuallyfromAZ 3. BusinessOwnerwithSevenPerDiemAttorneyVendors(independentbusinessownerswhoalsowork virtually) 4. FormerEarly Adopterof TechnologyInnovations B. Disclaimer Thiscourse providesageneral overviewof cybersecurityconcernsandhow theymightaffectyourwork. It is not legal advice, and I am not your attorney. If you require informationoradvice appliedtoyourunique situation,pleasemake anappointmenttodiscussitwithanexperiencedattorneyof yourchoosing. C. Presentation Goals
  • 2. 212.804.7041 nance@nschicklaw.com 1. Define conflictsthatarise betweenbestandactual practices 2. Identifythe affectedpartiesandtheirinterests 3. Take preventative action(where possible) 4. Respondappropriatelytoerrors II. Introduction of Topic and Key Presentation Points NOT SO FUN FACT: Forty-three percent of cyberattacks are aimed at small businesses. https://thebestvpn.com/cyber-security-statistics-2018/. A. You have duties to protect the confidentiality and privacy of certain data. 1. Businessprocessesandotherintellectualproperty protectedundercopyright,trademark,orpatent law 2. Decedents’healthrecords,if notidentityandotherdetails 3. Families’creditcard,bankaccount, or otherinformation 4. Employees’socialsecuritynumbers,immigrantstatus,residence information,healthinformation, and more NOT SO FUN FACT: More than 4,000 ransomware attacks occur every day. https://thebestvpn.com/cyber-security-statistics-2018/. B. Things can go wrong quickly. 1. Patco Constr.Co.Inc. v. People’sUnitedBank (1stCir.July2012). Patco wasa typical mid-sized businesscustomerof the bank.Itregularlywithdrew moneyto payemployees’wages andvendor invoices.Hackersinstalledmalware onPatco’scomputersandstole moneyfromitsbankaccounts. Despite seeingthe large off-shore withdrawal(whichwasunusual forthe business),the bank managerapprovedthe transaction,overridinganalert.He determinedthatthe log-inidentification and passwordcombinationweresufficient,soPatco’sbackaccountwas drained.Patcosuedthe bank.The court rejectedthe argumentthatthe bankmanagerwas negligent.Onappeal,the court reversedandremandedthe case fora trial to determine,amongotherthings,if the bankhadtaken appropriate cautionstosafeguardPatco’sinformation.The case settledbefore trial. 2. Federal Trade Commissionv.WyndhamWorldwideCorporation (3dCir. 2015). Aftera security breach,the Federal Trade Commissionfiledacivil actionagainst Wyndam, allegingthatthe
  • 3. 212.804.7041 nance@nschicklaw.com corporationmisledthe publicaboutcybersecuritypoliciesitcouldn’tkeep.The FTCwonan injunctionthatdirected,amongotherthingsimprovedrecordkeepingandcompliancemonitoring. 3. Galaria v.Nationwide Mut.Ins.Co.,2016 U.S. App.LEXIS 16840 (6th Cir.2016). Nationwide’s computernetworkwashacked,exposing sensitive personal information,suchas names,datesof birth,marital statuses,genders,occupations,employers,Social Securitynumbers,anddriver’s license numbersof more thana millionpeople. A classactionlawsuitwasfiled,due tothe “increasedriskof fraud”and expensesincurredinmitigatingthe riskof fraud,suchas purchasing creditreports,creditmonitoringservices,andothermitigationproducts. (Thecase haseithersettled or is still pending.) NOT SOFUN FACT: Seventy-eightpercentof people reporttheyknow the risksof clickinglinksinE-mail messagesfromunknownsources,buttheystillclickonthem. https://thebestvpn.com/cyber-security- statistics-2018/. C. You must protect yourself, your business, and your clients. 1. Take an inventoryof the potential vulnerabilitiesinyoursystems. 2. Discussthe vulnerabilitiesandpotential protectionswithyouremployees. 3. Facilitate aculture that takescybersecurity seriously,ensuringyouhave writtenprocedures regarding: a) the use of E-mail,social media,the Internet, websites,software, andpersonal devicesforwork b) notice of potential malware,ransomware,orothercyberattacks c) limitationsonaccessto workaccounts anddevices i. Vendors ii. Independentcontractors iii. Familymembers iv. Friends v. Clients vi. General public d) confidentialityandprivacy 4. Considerretainingoutsideconsultantstoevaluate yourrisks. 5. Ensure that yourDirectors’and Officers’ (D&O) andbusiness insurancecoversdatabreachlawsuits.
  • 4. 212.804.7041 nance@nschicklaw.com III. Review of Key Presentation Points A. You have duties to protect the confidentiality and privacy of certain data. You know the basics. The primary thing that has changed is the form of the data, which makes it more vulnerable to theft. Get protection. B. Things can go wrong quickly. You and your employees need to know what to do about malware, ransomware, and other data breaches. Get training. C. You must protect yourself, your business, and your clients. Get disciplined. IV. Questions A. Did you define a few conflicts between the best practices and ones you currently have in your funeral homes? B. Can you identify who is affected by these conflicts and therefore who you need to talk to? C. Did you learn of at least three preventative actions you can take in the next month to reduce your risk of a cybersecurity attack? D. Do you feel like you can respond appropriately to errors, if something bad happens? V. Thank you Speaker Biography Nance L. Schick, Esq. is an attorney, arbitrator, and mediator based in NewYork City. She is the founder of The Law Studio of Nance L. Schick, a largely virtual workshop, where clients can partner with conflict resolution professionals who are also licensed to practice law. She has been representing a multi-national funeral home corporation since 2004, and she has been teaching continuing education courses in the funeral industry since 2012.She is an award-winning entrepreneur, who has been acknowledged by the NewYork Economic Development Corporation/B-Labs (Finalist, Best for NYC 2015 & 2016), U.S. Chamber of Commerce (2015 Blue Ribbon Small Business),Enterprising Women Magazine (Honorable Mention, 2014 Woman of the Year awards), and Urban Rebound NY/Count Me In (Finalist, 2013 Pitch Competition).