There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
The EU’s General Data Protection Regulation (GDPR) is the most significant change to consumer privacy laws in decades and the enforcement date is approximately 1 month away. The standards for data collection and use in the EU will significantly differ from those in the United States. This session will breakdown the differences and discuss methods for compliance going forward.
PRESENTER
Gary Kibel, Partner, Davis & Gilbert LLP @GaryKibel
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
The EU’s General Data Protection Regulation (GDPR) is the most significant change to consumer privacy laws in decades and the enforcement date is approximately 1 month away. The standards for data collection and use in the EU will significantly differ from those in the United States. This session will breakdown the differences and discuss methods for compliance going forward.
PRESENTER
Gary Kibel, Partner, Davis & Gilbert LLP @GaryKibel
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
Considering the consequences of non-compliance (up to €20M/$24M or 4% worldwide annual revenue), this translates to a major problem for B2B marketers.
How can your team ensure its lead gen processes are GDPR-compliant without undermining demand generation performance?
View this deck to see how Julian Archer (Sr. Research Director, SiriusDecisions) and Scott Vaughan (CMO, Integrate) educate B2B marketers on: developing a comprehensive GDPR compliance strategy, putting your compliance strategy into action, and applying software to support your compliance measures.
To watch the on-demand version of the webinar, click here:
https://www.integrate.com/gdpr-compliance-b2b-marketing-webinar
“Data localisation or data residency laws require data about a nations' citizens or residents be collected, processed, and/or stored inside the country, often before being transferred internationally, and usually transferred only after meeting local privacy or data protection laws, such as giving the user notice of how the information will be used and obtaining their consent.” - Wikipedia
California Consumer Privacy Act - What You Need To KnowTokenEx
The California Consumer Privacy Act (AB 375, or CCPA for short) is a law passed by California’s state legislature in June of 2018. The new law will likely have major implications for organizations that obtain, process, or store the personal data of any California resident.
General Data Protection Regulation for OpsKamil Rextin
A brief on GDPR & Hubspot for Marketing & Marketing Ops.
This PPT provides a brief background on GDPR & how to implement GDPR compliance with Hubspot , Facebook & Google Analytics
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
Joe Youssef provides an insightful overview of the California Consumer Privacy Act (CCPA) that will take into effect in 2020. This presentation explores the key principles of the CCPA and how brands can prepare to ensure they are compliant with the policy.
Effective legal representation of innovators and inventors requires careful thought and consideration. Among other things, care must be taken to properly initiate communications, prepare assignments, and handle subsequent legal disputes. This webinar discusses common legal issues that often arise during the representation of innovators and inventors. It also includes valuable advice from both innovators/inventors and the IP attorneys who represent them.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/legal-issues-for-innovators-inventors-2021/
This is a presentation comparing the high level differences between the General Data Protection Regulation (GDPR) of the european union and the recently enacted California Consumer Privacy Act (CCPA). The presentation covers topics such as recent events in data privacy, who must comply with the laws, what is considered personal information, and requirements that organizations must follow under both laws.
In this presentation, Catherine Coulter discusses the Federal Privacy Law and how this can affect your company. Touching on privacy in corporate transactions, Canada-USA cross border data transfers and the Federal Privacy Commissioner Guidelines, learn how to act if your organization finds itself in a breach situation.
What You Need To Know About Privacy - Now!Now Dentons
This presentation gives an update on Federal Privacy Law, privacy in corporate transactions, Canada-USA Cross-Border Data Transfers and federal privacy commissioner.
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
Following the adoption of GDPR in the European Union, the United States has seen their own privacy regulatory landscape evolve and develop. Beginning in California and expanding to Nevada, Maine, and beyond, ensuing organizational and technical compliance with these stringent regulations has become a priority for many organizations. These regulations have come with additional reputational and regulatory risk (e.g. fines), increased consumer rights, and an enhanced focus on how companies use data as a commodity. This webinar will unpack the key complexities surrounding those regulations, speak to how technology advancements can assist in compliance and overall privacy program maturity, and discuss how Internal Audit can prepare for and drive a proactive approach to privacy.
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2021/
Data Privacy: What you should know, what you should do!
CSMFO Data Privacy in the Governmental Sector, Local Government. Data Privacy Laws, PCI, Breaches, AICPA – Generally Accepted Privacy Principles
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
Considering the consequences of non-compliance (up to €20M/$24M or 4% worldwide annual revenue), this translates to a major problem for B2B marketers.
How can your team ensure its lead gen processes are GDPR-compliant without undermining demand generation performance?
View this deck to see how Julian Archer (Sr. Research Director, SiriusDecisions) and Scott Vaughan (CMO, Integrate) educate B2B marketers on: developing a comprehensive GDPR compliance strategy, putting your compliance strategy into action, and applying software to support your compliance measures.
To watch the on-demand version of the webinar, click here:
https://www.integrate.com/gdpr-compliance-b2b-marketing-webinar
“Data localisation or data residency laws require data about a nations' citizens or residents be collected, processed, and/or stored inside the country, often before being transferred internationally, and usually transferred only after meeting local privacy or data protection laws, such as giving the user notice of how the information will be used and obtaining their consent.” - Wikipedia
California Consumer Privacy Act - What You Need To KnowTokenEx
The California Consumer Privacy Act (AB 375, or CCPA for short) is a law passed by California’s state legislature in June of 2018. The new law will likely have major implications for organizations that obtain, process, or store the personal data of any California resident.
General Data Protection Regulation for OpsKamil Rextin
A brief on GDPR & Hubspot for Marketing & Marketing Ops.
This PPT provides a brief background on GDPR & how to implement GDPR compliance with Hubspot , Facebook & Google Analytics
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
Joe Youssef provides an insightful overview of the California Consumer Privacy Act (CCPA) that will take into effect in 2020. This presentation explores the key principles of the CCPA and how brands can prepare to ensure they are compliant with the policy.
Effective legal representation of innovators and inventors requires careful thought and consideration. Among other things, care must be taken to properly initiate communications, prepare assignments, and handle subsequent legal disputes. This webinar discusses common legal issues that often arise during the representation of innovators and inventors. It also includes valuable advice from both innovators/inventors and the IP attorneys who represent them.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/legal-issues-for-innovators-inventors-2021/
This is a presentation comparing the high level differences between the General Data Protection Regulation (GDPR) of the european union and the recently enacted California Consumer Privacy Act (CCPA). The presentation covers topics such as recent events in data privacy, who must comply with the laws, what is considered personal information, and requirements that organizations must follow under both laws.
In this presentation, Catherine Coulter discusses the Federal Privacy Law and how this can affect your company. Touching on privacy in corporate transactions, Canada-USA cross border data transfers and the Federal Privacy Commissioner Guidelines, learn how to act if your organization finds itself in a breach situation.
What You Need To Know About Privacy - Now!Now Dentons
This presentation gives an update on Federal Privacy Law, privacy in corporate transactions, Canada-USA Cross-Border Data Transfers and federal privacy commissioner.
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
Following the adoption of GDPR in the European Union, the United States has seen their own privacy regulatory landscape evolve and develop. Beginning in California and expanding to Nevada, Maine, and beyond, ensuing organizational and technical compliance with these stringent regulations has become a priority for many organizations. These regulations have come with additional reputational and regulatory risk (e.g. fines), increased consumer rights, and an enhanced focus on how companies use data as a commodity. This webinar will unpack the key complexities surrounding those regulations, speak to how technology advancements can assist in compliance and overall privacy program maturity, and discuss how Internal Audit can prepare for and drive a proactive approach to privacy.
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2021/
Data Privacy: What you should know, what you should do!
CSMFO Data Privacy in the Governmental Sector, Local Government. Data Privacy Laws, PCI, Breaches, AICPA – Generally Accepted Privacy Principles
Privacy and Information Security: What Every New Business Needs to KnowThe Capital Network
Reports of data security breaches conjure up images of anonymous computer hackers sitting in a darkened room,
fingers flying over a key board in an effort to hack into a computer system to find valuable information to exploit.
Not long ago, most of us considered these breaches to be infrequent and likely targeted at information much more
commercially unique than the average consumer data stored by most businesses.
This course provides an overview of whistleblower protections for employees who blow the whistle on cybersecurity or data privacy concerns. And it offers practical tips and insights for practitioners on how to evaluate potential cybersecurity whistleblower claims and overlapping remedies to maximize damages. In addition, the course addresses the challenging issues that arise when a whistleblower simultaneously prosecutes both whistleblower retaliation and whistleblower rewards claims.
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to:
https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2020/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
Part of the webinar series: CORPORATE & REGULATORY COMPLIANCE BOOTCAMP 2022 - PART I
See more at https://www.financialpoise.com/webinars/
Does your organization take credit card information? Do you store personal information on your staff, clients or donors. Raffa can help you avoid the pitfalls and penalties that can come from storing these privacy related items in unsecured ways.
PCI DSS, the Payment Card Industry Data Security Standard is a set of requirements designed to ensure that all companies that process, store or transmit credit card information maintain a secure environment. This applies to essentially any merchant that has a Merchant ID (MID).
HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any company that deals with protected health information must ensure that all the required physical, network, and process security measures are in place and followed. This includes anyone who provides treatment, payment and operations in healthcare, and anyone with access to patient information and provides support in treatment, payment or operations.
Come learn the basics of these industry regulations, including:
-Who it applies to
-Requirements for compliance
-Penalties for noncompliance
Join us and learn where your organization may have security gaps or be out of state or federal compliance. In this seminar, we will discover how a combination of good policies and the implementation of good, solid solutions can help you meet compliance requirements, and protect and secure your organization or business.
Privacy rules matter—make sure your firm stays compliant.
While every lawyer knows the basic rules behind confidentiality and attorney-client privilege, the significance of privacy law is less well-known—and that lack of knowledge can impact your law firm. Emerging privacy rights and rights of action are impacting businesses of all types—including those in the legal profession. Local, national, and even international laws are making privacy the next frontier in data management for lawyers.
Are you prepared to adjust to the new demands of privacy for law firms, and move beyond confidentiality?
Join Joshua Lenon—an IAPP Certified Information Privacy Professional and Clio’s Lawyer in Residence and Data Protection Officer—as he explains how these privacy laws can impact law firms and what your firm should do to ensure compliance.
In this free 1-hour CLE-eligible webinar, you’ll learn:
Why law firm data must conform with emerging privacy regulations
The impact of clients’ compliance with privacy law on firm operations
Future privacy laws that may affect your law firm—no matter where you operate
https://www.clio.com/events/webinar-law-firm-privacy/
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
Data breach events result in significant losses each year. Our partners at Bonahoom & Bobilya, LLC, created a presentation about understanding the hidden regulatory risks of a data breach so you can keep your company from going out of business.
This presentation has been shared with permission.
Affirmative Defense Response System (ADRS)guest95afa8
Mitigating damages and reducing risk before, during and after a data breach occurs is what ADRS is all about. A system that shows "every good faith effort" at protecting the NonPublic Personal Information (NPI) of your customers, employees, and vendors as mandated by the FTC.
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
The Data Protection Act 2019, was enacted on November 8th, 2019, ushering a new era of accountability and responsibility with regard to processing of personal data and information. Naturally, there has been a resurrection of the chatter around data protection in increasingly data-driven social and economic settings. The question on everyone’s mind being what does this mean for me?
Does your organization take credit card information? Do you store personal information on your staff, clients or donors? Raffa can help you avoid the pitfalls and penalties that can come from storing these privacy related items in unsecured ways.
PCI DSS, the Payment Card Industry Data Security Standard is a set of requirements designed to ensure that all companies that process, store or transmit credit card information maintain a secure environment. This applies to essentially any merchant that has a Merchant ID (MID).
HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any company that deals with protected health information must ensure that all the required physical, network, and process security measures are in place and followed. This includes anyone who provides treatment, payment and operations in healthcare, and anyone with access to patient information and provides support in treatment, payment or operations.
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileFinancial Poise
This segment will delve into considerations that come into play when filing or responding to post-grant review proceedings. These considerations include issues of real party in interest, timing, and substantive arguments.
Part of the webinar series: IP-301 POST-GRANT REVIEW TRIALS 2022
See more at https://www.financialpoise.com/webinars/
This segment will discuss the statutory and procedural background of post-grant review proceedings. It will discuss the types of proceedings available and provide a high-level discussion of how the proceedings are conducted.
Part of the webinar series:
IP-301 POST-GRANT REVIEW TRIALS 2022
See more at https://www.financialpoise.com/webinars/
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingFinancial Poise
Even when a bankruptcy petition is the result of a soft-landing rather than a freefall, filing a chapter 11 petition is a disruptive event. To facilitate the debtor’s entry into chapter 11 with as little disruption as possible, first day motions are filed to ensure that a debtor-in-possession can minimize interruptions and continue operating its business in order to achieve its goals in chapter 11. This webinar provides an overview of the administrative and operational first day motions typically filed by chapter 11 debtors and the process for requesting a first day hearing, providing notice of the hearing, and ensuring that the hearing runs smoothly.
Part of the webinar series: THE NUTS & BOLTS OF BANKRUPTCY LAW 2022
See more at https://www.financialpoise.com/webinars/
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!Financial Poise
Sometimes it begins when a client, tenant, or customer starts to slow-pay, with the result that your accounts receivable start to accrue gradually. Other times the issue presents itself more suddenly. Either way, you find your company owed a great deal of money that looks like it may not be collected because your client/tenant/customer has filed bankruptcy, has commenced an assignment for the benefit of creditors, has been put into receivership, or is otherwise just plain insolvent. What do you do? What should you not do? The topics discussed in this webinar include the pros and cons of putting a counterparty into involuntary bankruptcy; when and how you may be able to pursue third parties (like guarantors, directors, or officers) for the amount owed; risks related to preference attack; pros and cons of sitting on a “creditors’ committee” in a Chapter 11; how to negotiate for “critical vendor” protection in Chapter 11; and practical guidance for continuing to provide goods or services to an insolvent counterparty.
Part of the webinar series: RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022
See more at https://www.financialpoise.com/webinars/
We’ve all long heard about writing practices to avoid, including run-on sentences, excessive passive voice, and nominalization. This webinar not only discusses how those habits can damage briefs, but also explores a key habit brief-writers should embrace: using strong, precise verbs, which are the engine of a persuasive sentence. Panelists also exchange views about finding the most persuasive voice and tone, as well as the right temperature for rhetoric.
Part of the webinar series: PERSUASIVE BRIEF WRITING 2022
See more at https://www.financialpoise.com/webinars/
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...Financial Poise
You’ve received the dreaded call that your company has just suffered a data breach – what do you do next? Who do you call for help? What notification obligations do you have?
With proper preparation, you can mitigate the damage caused by this unfortunate event and put your business in a position to recover. Your company may have already implemented its information security program and identified the responsible parties, including applicable outside experts, to be contacted in the event of a breach. However, now you must call up your incident response team to investigate the extent of the breach, evaluate the possible damage to your company, and determine whether you must notify your clients, customers, or the public of the breach. This webinar will help prepare you to take action when the worst happens.
Part of the webinar series:
CYBER SECURITY and DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
Data is one of your business’s most valuable assets and requires protection like any other asset. How can you protect your data from unauthorized access or inadvertent disclosure?
An information security program is designed to protect the confidentiality, integrity, and availability of your company’s data and information technology assets. Federal, state, or international law may also require your business to have an information security program in place.
This webinar will provide the basics of how to create and implement an information security program, beginning with identifying your incident response team, putting applicable insurance policies into place, and closing any gaps in the security of your data.
Part of the webinar series:
CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...Financial Poise
Obtaining a final and enforceable judgment is often just the first phase of the civil litigation process; without effective enforcement and collection, a judgment is merely a piece of paper (or electronic docket entry). This webinar provides an overview of the technical, procedural and strategic considerations necessary to monetize judgments and make litigation worthwhile.
Part of the webinar series: NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022
See more at https://www.financialpoise.com/webinars/
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 Financial Poise
When is an appeal permitted and when should you take one? What rules and procedures govern appellate practice and how can you best avoid technical and procedural mistakes. How are appellate briefs different from those filed with the trial court and what are some keys to making them successful? And how can you best prepare for appellate oral argument? This webinar explores these questions and more with a panel of experienced appellate litigators.
Part of the webinar series: NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022
See more at https://www.financialpoise.com/webinars/
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...Financial Poise
There's creating content; then there's creating great content; and then there's creating great content that actually gets seen by the ideal audience. Each of those layers has its own unique challenges. In this webinar episode, we share insights from a variety of highly experienced content creators. Each panelist member provides their own unique spin on how to create great content that gets seen by the intended audience. By the completion of this episode, the audience member will have a clear and actionable plan on how to create outstanding content that meets their unique marketing needs.
Part of the webinar series: MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022
See more at https://www.financialpoise.com/webinars/
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas Financial Poise
Although issues in oil and gas chapter 11 cases vary from case to case, there are, nonetheless, certain issues that tend to arise in most oil and gas cases. Among them: treatment of oil and gas leases, the payment of royalties, hedging agreements, and valuation. This webinar addresses such issues.
Part of the webinar series: CHAPTER 11 - INDUSTRY FOCUS 2022
See more at https://www.financialpoise.com/webinars/
BUSINESS LAW REVIEW- 2022: Selling a Business Financial Poise
A Startup is the Founders’ baby - they dream it, created it and worked tirelessly to make it successful. Deciding it may be time to sell all or part is the easy part - acknowledging and addressing the financial and emotional issues can be challenging.
Negotiating with potential buyers or investors is time intensive, to say the least. Positioning a business for a value maximizing transaction requires planning. What professionals need to be engaged? How do the parties come to a valuation? What is the profile of the likely investor or buyer? These are just some of the questions this webinar addresses.
Part of the webinar series: BUSINESS LAW REVIEW- 2022
See more at https://www.financialpoise.com/webinars/
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101Financial Poise
A basic understanding of immigration law is critical to a vast array of businesses operating in today’s economy. Foreign employees and their sponsoring companies will navigate a complex maze in the attempt to achieve the desired goals of the employee maximizing their ability to provide services and value to the company. One of various determining factors as to which pathway to attempt is whether the goal is an immigrant visa (also known as a “green card”) which may ultimately allow lawful permanent residence in the United States or a non-immigrant visa. The need for foreign labor affects various industries and applies to large segments of skilled, unskilled and semi-skilled workers in jobs ranging from farm to seasonal to high-tech. This webinar explains what businesses need to know in the current environment as well as how political and globalization issues will affect immigration laws going forward.
Part of the webinar series:
BUSINESS LAW REVIEW- 2022
See more at https://www.financialpoise.com/webinars/
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts Financial Poise
Expert witnesses are an integral part of modern commercial litigation. They can be used for everything from calculating damages to explaining software workflows to establishing industry standards. This webinar begins with an exploration of the common types of cases that call for use of expert testimony. From there, we discuss the rules governing experts, including expert disclosures, discovery, and expert depositions. We also discuss the Daubert standard for excluding expert testimony, and discuss how a successful Daubert motion may be brought. This hour will help you figure out when and how to hire your own expert, and will give you some ideas on how to challenge your opponent’s expert when the time comes.
Part of the webinar series:
NEWBIE LITIGATOR SCHOOL - Part I 2022
See more at https://www.financialpoise.com/webinars/
Executive compensation continues its movement towards performance pay as the standard. Compensation structures and proxy disclosures are more and more complex. Investors and proxy advisors continue to increase influence on compensation issues. This webinar examines executive compensation, including equity-based compensation plans and executive employment and severance agreements. The importance of disclosure, alignment of risk, and metrics is also examined. Practical guidance on pay-for-performance and supplemental pay definitions is provided. The panelists discuss the effect of the Dodd-Frank Act on executive compensation, including SEC regulations. Exchange rules are compared to applicable federal law. Best practices regarding executive compensation committees and regulatory requirements for those committees are examined. Shareholder advisory groups promulgate executive compensation related advisory policies for their institutional shareholder clients annually and these policies are also discussed. Issues regarding board composition and leadership structure issues are discussed in relation to executive compensation.
Part of the webinar series:
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2
See more at https://www.financialpoise.com/webinars/
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...Financial Poise
The Securities and Exchange Commission has been entrusted with a significant corporate compliance regulatory function, which has been expanded by seminal legislation in the recent past such as the Sarbanes-Oxley (“SOX”) and Dodd-Frank Acts. This webinar discusses board fiduciary duties and the tension between state corporate law standards and federal law. Board composition, independence, structure and processes (including best practices in regard to committees) are analyzed. Specifically, director independence is discussed as is audit committees and related requirements, regulations and exemptions. NASDAQ and the NYSE also have similar requirements for director independence and those are also discussed. The webinar also covers disclosure matters related to SOX compliance, including timing and content of an issuer's periodic disclosures. Both the legal requirements and best practices related to disclosure procedures and internal controls under SOX are examined. Means of controlling the costs of SOX, especially for smaller public companies, are also discussed, including trends in the industry related to high regulatory compliance costs. Finally, the applicability and best practices for privately held companies and SOX are considered.
Part of the webinar series: CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2
See more at https://www.financialpoise.com/webinars/
The deal is complete, and the parties have finished the hard work. Or have they? Integration planning turns to execution as people, process, and technology are combined once the deal is legally closed. The buyer will need to consider the purchased business or assets from the standpoint of employees, IT, customers, suppliers, and a multitude of other areas. In addition, numerous post-closing legal issues may arise, including purchase price adjustments, breaches of representations and warranties, enforcement of key negative employment-related covenants and restrictive covenants, collection of pre-closing accounts receivable, and true-ups of final financials. This episode guides listeners through the process, timing, and issues which most commonly arise after the closing of deals.
Part of the webinar series:
M&A BOOT CAMP - 2022
See more at https://www.financialpoise.com/webinars/
Although every deal is different, understanding any purchase/sale agreement will help you understand other purchase sale agreements. Stated another way, most M&A documents include a similar set of sections and use a similar vocabulary. This episode explains specific, common provisions and discusses how buyers and sellers approach these provisions differently, particularly in light of situational differences (e.g. whether the assets being bought and sold are equity of a company or the assets of a company; whether the seller is going to cease to exists or not). Topics covered will include tax issues; corporate governance; closing conditions; representations and warranties; indemnification provisions; earn-outs; restrictive covenants; antitrust; intellectual property; and employment issues.
Part of the webinar series:
M&A BOOT CAMP - 2022
See more at https://www.financialpoise.com/webinars/
Buying, selling, or merging a company typically follows a similar set of steps from deal to deal. The amount of time each step takes varies but the order of the steps is fairly uniform because the steps follow a certain logic: before the parties share meaningful information, they should sign a confidentiality agreement (a/k/a “non-disclosure agreement,” or “NDA”); once a baseline amount of information is known by the would-be buyer, it commonly presents a letter of intent or term sheet to the target or its owner, which serves as an outline for a deal but does not necessarily bind the parties to consummate the transaction; additional due diligence and the negotiation, drafting and signing of definitive documents comes next. The parties then obtain any needed regulatory and/or contractual third party approvals; followed by closing; and finally by post-closing tasks. This webinar will discuss all these steps from a macro perspective so that you can see the forest for the trees, but does not do a deep dive into any single topic. Think of this webinar as a road map or timeline for a typical deal.
Part of the webinar series:
M&A BOOT CAMP - 2022
See more at https://www.financialpoise.com/webinars/
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveFinancial Poise
This webinar focuses on the opportunities that crowdfunding makes available to the investor, and how the investor should go about navigating this new world. We begin with a basic overview of the new regulatory regime, the requirements to invest, and the on-boarding process one should expect. We then dive deeper into the market opportunity, including how to access and select investments, and expectations investors should set for themselves and the projects they select. This is not intended to support any specific deal selection, but instead sheds a light upon the basic selection criteria available, the method to go about investing and what to avoid.
Part of the webinar series: Crowdfunding 2022
See more at https://www.financialpoise.com/webinars/
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
5. Disclaimer
The material in this webinar is for informational purposes only. It should not be considered
legal, financial or other professional advice. You should consult with an attorney or other
appropriate professional to determine what may be best for your individual needs. While
Financial Poise™ takes reasonable steps to ensure that information it publishes is accurate,
Financial Poise™ makes no guaranty in this regard.
5
7. About This Webinar – Introduction to US Privacy
and Data Security: Regulations and Requirements
There is no federal law governing privacy and data security applicable to all US citizens.
Rather, individual states and regulatory agencies have created a patchwork of protections
that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and
regulations which may impact your business, from the state law protecting personal
information to regulations covering the financial services industry to state breach notification
laws.
7
8. About This Series – Cybersecurity and Data Privacy
Data security, data privacy, and cybersecurity are critical issues for your company to consider
in today’s business landscape. Data breaches from high profile companies, including law
firms, generate worldwide headlines and can severely damage your business’s reputation. In
certain industries, a patchwork of state and federal laws and regulations may cover your
business, leading to compliance headaches. This series explores the various laws and
regulations which govern businesses both in the US and abroad, as well as how to implement
and enforce an information security policy to protect your company and limit any damage from
a data breach.
Each Financial Poise Webinar is delivered in Plain English, understandable to investors, business owners, and
executives without much background in these areas, yet is of primary value to attorneys, accountants, and other
seasoned professionals. Each episode brings you into engaging, sometimes humorous, conversations designed to
entertain as it teaches. Each episode in the series is designed to be viewed independently of the other episodes so that
participants will enhance their knowledge of this area whether they attend one, some, or all episodes.
8
9. Episodes in this Series
#1: Introduction to US Privacy and Data Security: Regulations and Requirements
Premiere date: 9/24/20
#2: Introduction to EU General Data Protection Regulation: Planning,
Implementation, and Compliance
Premiere date: 10/22/20
#3: How to Build and Implement your Company's Information Security Program
Premiere date: 11/19/20
#4: Data Breach Response: Before and After the Breach
Premiere date: 12/17/20
9
11. What is Data Security?
• Confidentiality, availability, and integrity of data
• All the practices and processes used to protect data from being used or accessed by
unauthorized individuals
• How a company safeguards the data it collects and uses from threats
11
12. What is Data Privacy?
• The appropriate use of data, including the use of data according to agreed purposes
• How a company uses the data that it has collected
12
13. What is Personal Information?
• “personally identifiable information” sometimes called “PII”
Can be linked to a specific individual
Name, email, full postal address, birth date, SSN, driver’s license number,
account numbers
• “non-personally identifiable information”
Cannot by itself be used to identify a specific individual
Aggregate data, zip code, area code, city, state, gender, age
13
14. What is Personal Information?
• Gray area – “anonymized” data
Non-PII that, when linked with other data, can effectively identify a person
Geolocation data
Site history and viewing patterns from IP address
Note: recent rollback of privacy regulation with the FCC?
14
15. Why Do We Need to Protect It?
• Data is a corporate asset
• Corporate data is at a higher risk of theft or misuse than ever before
• Consumers now expect companies to take initiative to protect both security and privacy
15
16. What Must Companies Do to Protect It?
• Compliance with state, local, federal laws and regulations
Patchwork of laws developed by sector
Contrast to Europe, which has a centralized, uniform law
Makes it difficult to comply when multiple, possibly inconsistent laws apply
• Contracts with third parties
16
17. What Must Companies Do to Protect It?
• Privacy policies for website users
Don’t need one if: website is static, is purely B2B, and collects no PII from
consumers
Should cover:
o Actual practices for PII and information that reasonably could be
associated with a person or device, regarding collection, storage, use, and
sharing of info
Be aware of: financial information, medical information, children’s information
• Privacy audits:
Run them periodically to review and assess policies and practice for data
17
18. What Must Companies Do to Protect It?
• Your company may have more PII than you are aware of
For example, if your company gives out commercial loans, it must comply with
GLB
BUT: if you also take guarantees, then you have personal information such as
account information, possibly life insurance information, mortgage information,
etc. that must be secured
Have to think more creatively about what types of information you might be
collecting
o Credit card payments – have to secure that information
18
19. California Consumer Privacy Act
• Effective January 1, 2020, companies will have to observe restrictions on data
monetization business models, accommodate rights to access, deletion, and porting of
personal data, and update privacy policies
• “Consumers” (defined as natural persons who are California residents) have the right to
know what personal information a business has collected about them and what it is used for,
the right to opt out of allowing a business to sell their personal information to third parties, the
right to have a business delete personal information, and the right to receive equal servicing
and pricing from a business even if they exercise their privacy rights under the Act.
19
20. California Consumer Privacy Act
• “personal information” is “any information that…relates to…a particular consumer or
household”
Information about a household may include information like utility bills or
pricing
• Companies must comply if they receive personal data from California residents and they
or their parent company or a subsidiary exceed (a) annual gross revenues of $25 million, (b)
obtains personal information of 50,000 or more California residents, households or devices
annually, or (c) 50 percent or more annual revenue from selling California residents’ personal
information.
20
21. California Consumer Privacy Act
• The Act provides a private right of action that allows consumers to seek, either
individually or as a class, statutory or actual damages and injunctive relief, if their sensitive
personal information is subject to unauthorized access and exfiltration, theft or disclosure as a
result of a business’s failure to implement and maintain reasonable security measures
Statutory damages can be between $100 and $750 per California resident per
incident, or actual damages, whichever is greater
21
22. New York Stop Hacks and Improve Electronic Data
Security (“SHIELD”) Act
• Expands NY breach notification law and imposes data security program requirements on
businesses that possess the private information of New York State residents
• Applies regardless of whether the businesses have any physical presence in New York
State
• Program requirements include administrative, technical, and physical safeguards for
detecting and responding to intrusions and maintaining security of information
• Businesses subject to and in compliance with Gramm-Leach-Bliley, HIPAA, or the NY
Dept. of Financial Services Cybersecurity Requirements are exempted from this requirement
under the SHIELD Act
• Limited reprieve for “small businesses” with fewer than fifty employees, less than $3
million in gross revenues in the last three fiscal years, or less than $5 million in year-end total
assets
• Expands the definition of “private information” subject to NY data breach notification law
• NY Attorney General can pursue civil penalties, but there is no private right of action
22
23. Massachusetts Standards – 201 C.M.R. 17
• 2010 law – most protective privacy law in the US at that time
• Requires every business that licenses or owns personal information of Massachusetts
residents to comply with the minimum security standards set forth in the regulation
• Considered the gold standard
• Require, when technically feasible, the encryption of personal information stored on
portable devices and personal information transmitted across public networks or wirelessly
23
24. Massachusetts Standards – 201 C.M.R. 17
• Requires any natural person or entity that owns or licenses information of a Mass.
Resident to implement a written information security program (“WISP”) with appropriate
administrative, technical, and physical safeguards
Standards must be consistent with those set forth in state and federal
regulations to which a business is subject, including data breach notification
laws, HIPAA, and the Gramm-Leach-Bliley Act
24
25. Massachusetts Standards – 201 C.M.R. 17
• “personal information” – “a Massachusetts resident’s first name and last name or first
initial and last name in combination with any one or more of the following data elements
that relate to such resident: (a) Social Security number; (b) driver’s license number or
state-issued identification card number; or (c) financial account number, or credit or debit
card number, with or without any required security code, access code, personal
identification number or password, that would permit access to a resident’s financial
account.”
25
26. GDPR and the Shrems II Decision
• New decision from the Court of Justice of the European Union
• Invalidated the US-EU Privacy Shield
• Closes off key mechanisms for transferring personal data from the EU to the US
• Shrems I invalidated European Commission adequacy decisions with respect to EU-U.S.
Safe Harbor
• CJEU was concerned with US government access to personal data for national security
purposes and the rights of EU citizens in the US to judicial review and redress
• CJEU found the U.S. was not according EU personal data the protection and rights of
redress available in the EU
• International data flows can continue to be based on EU Standard Contractual Clauses if
properly monitored
26
27. Gramm-Leach-Bliley
• Overseen by the FTC
Requires financial institutions (companies that offer consumers financial
products or services like loans, financial or investment advice, or insurance) –
to explain their information-sharing practices to their customers and to
safeguard sensitive data.
• The Gramm-Leach-Bliley Act (GLBA) requires financial institutions to provide notice of
their privacy policies and practices to their customers, and prohibits financial institutions from
disclosing non-public personal information about a consumer to non-affiliated third parties,
unless the institutions provide certain information to the consumer and the consumer has not
elected to opt out.
27
28. Gramm-Leach-Bliley
• The GLBA also requires financial institutions to protect the security and confidentiality of
their customers’ non-public personal information.
• Regulators (e.g., the Securities and Exchange Commission, the Office of the Comptroller
of the Currency, the Federal Reserve and the Commodity Futures Trading Commission) have
promulgated rules under the GLBA.
28
29. HIPAA
• The Health Insurance Portability and Accountability Act (HIPAA) regulates medical
information.
• HIPAA Privacy Rule:
Requires appropriate safeguards to protect the privacy of “protected health
information” (PHI).
Sets limits and conditions on the uses and disclosures that may be made of
such information without patient authorization.
• Gives patients rights over their health information, including rights to examine and obtain
a copy of their health records, and to request corrections.
29
30. HIPAA
• HIPAA Security Rule requires appropriate administrative, physical and technical
safeguards to ensure the confidentiality, integrity, and security of “electronic protected health
information” (ePHI).
• Privacy Rule and Security Rule are primarily enforced by the U.S. Department of Health
& Human Services Office for Civil Rights.
30
31. COPPA
• Children’s Online Privacy Protection Act (administered by the FTC)
Requires parental consent for the collection or use of any personal data for a
child under 13 years old
Requires posting of a privacy policy on the website
Site operators must permit parental review of any data stored on their child
Parents are permitted to delete, but not otherwise alter, their child’s data
31
32. FTC Act
• Section 5(a) of the FTC Act prohibits “unfair methods of competition in or affecting
commerce, and unfair or deceptive acts or practices in or affecting commerce.”
• Under Section 5(n) of FTC Act, the Federal Trade Commission (FTC) may prohibit an
act or practice on the grounds that it is “unfair,” if it causes (or is likely to cause) substantial
injury to consumers that is:
Not reasonably avoidable by consumers themselves and
Not outweighed by countervailing benefits to consumers or to competition.
32
33. FTC Act
• “unfair” if: a practice causes or is likely to cause substantial injury to consumers, cannot
be reasonably avoided by consumers, and it is not outweighed by countervailing benefits to
consumers or to competition
• “deceptive” if: practice misleads, or is likely to mislead, consumers, consumers’
interpretation of it is reasonable under circumstances, and it is material
Examples of deceptive: violating published privacy policies, downloading
spyware or adware onto unsuspecting users’ computers, failing to verify
identity of persons to whom confidential consumer information was disclosed
Examples of unfair: failing to implement reasonable safeguards to protect
privacy of consumer information
33
34. FTC Act
• FTC is the main federal regulator in charge of policing privacy and cybersecurity
practices among U.S. companies generally.
• FTC pursues cases against companies for “unfair” or “deceptive” practices, where the
company allegedly had inadequate cybersecurity practices, or overstated how comprehensive
their privacy and cybersecurity practices were.
• Consent decrees and settlements often result in monetary damages, and requirements
that companies establish rigorous privacy and data security practices (which would be
overseen by the FTC).
34
35. CAN-SPAM Act
• The Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-
SPAM Act) regulates emails that companies send for primarily commercial purposes (e.g.,
advertisements).
• Bans false or misleading header information and prohibits deceptive subject lines.
• Requires that unsolicited commercial email be identified as advertising and allow
recipients to opt out of receiving future emails.
• FTC enforces the CAN-SPAM Act.
35
36. The Telephone Consumer Protection Act (TCPA)
• Restricts the making of telemarketing calls and the use of automatic telephone dialing
systems and artificial or pre-recorded voice messages.
• TCPA creates a private right of action for consumers, and has been a source of
significant class action activity.
• Federal Communications Commission (FCC) and state attorneys general enforce the
TCPA.
36
37. The Fair Credit Reporting Act (As Amended by the Fair
and Accurate Credit Transactions Act) Applies to:
• Consumer reporting agencies (e.g., Equifax, Experian and TransUnion);
• Companies that use consumer reports (e.g., lenders); and
• Companies that provide consumer reporting information (e.g., credit card companies).
37
38. State Level Data Breach Laws
• All 50 states, the District of Columbia, and some U.S. territories have their own data
breach notification laws
• These laws generally require notification of affected individuals and regulators when a
company suffers a breach of the security of an individual’s personally identifiable information
(PII).
• If a company suffers a data breach involving the PII of customers or employees who are
resident in multiple states, it will need to comply with each applicable state’s laws.
38
39. What is a Data Breach? (That May Trigger State
Notification Laws)
• Unauthorized acquisition of PII that compromises the security, confidentiality or integrity
of PII…
That results or could result in identity theft or fraud (OH)
Unless PII is not used or subject to further unauthorized disclosure (NE)
Unless no misuse of PII has occurred or is not reasonably likely to occur (NJ)
Unless no reasonable likelihood of harm to consumer whose PII was acquired
has resulted or will result (CT)
That has caused or is likely to cause loss or injury to resident (MI)
That causes or is reasonably likely to cause substantial economic loss to the
individual (AZ)
Unless no reasonable likelihood of financial harm to consumer whose PII was
acquired has resulted or will result (IA)
39
40. Why We Should be Careful with the Word “Breach”
• Using “breach” to describe a data-privacy related incident assumes the incident meets
the definition of a security breach which triggers various notification requirements
• An “incident” does not always rise to the level of “breach” (i.e., encryption safe harbor)
• “Incident” is better received by the public than “breach”
40
41. Breach Notification Laws
• State laws differ with respect to:
Deadline for notifying (14, 30, 45 days; reasonable time)
Notification to Attorney General
Notification to other State agencies
Including Attorney General contact information
Substitute notice (email, website, media)
Specific facts of incident and type of PII compromised
Maintaining records of incident (for 3-5 years)
Countries also differ with notice requirements
41
43. About The Faculty
Kathryn Nadro - knadro@sfgh.com
Kathryn (“Katie”) Nadro advises clients on a diverse array of business matters, including commercial and
business disputes, employment issues, and data security and privacy compliance. Katie works with
individuals and businesses of all sizes to craft successful resolutions tailored to each individual matter.
Katie has broad experience representing companies and individuals in contract, non-compete,
discrimination, harassment, fiduciary duty, and trade secret litigation in state and federal court. With a
background as both in-house and outside counsel, Katie understands that business objectives, time, and
resources play an important role in reaching a favorable outcome for each client. Katie assists clients in
navigating employment issues ranging from employee handbooks and FMLA policies to litigating
discrimination and harassment claims, all while ensuring business needs and objectives are met. She
also counsels clients on data security and privacy issues, including policy drafting and compliance with
state, federal, and international law.
43
44. Cassandra Porter - caporter@zuora.com
Cassandra M. Porter is the Americas/APAC data privacy lead attorney for a Fortune 100 Tech company
working to transform clients’ businesses, operations and technology models for the digital era. She
counsels internal clients on privacy-related matters such as data collection practices, online advertising,
mobile commerce, along with the development and acquisition of new technology, data incidents and
management. Cassandra is a member of the inaugural class of Privacy Law Specialists, a new specialty
recognized by the American Bar Association, and a Fellow of Information Privacy by the International
Association of Privacy Professionals (IAPP). Her IAPP credentials as a Certified Information Privacy
Professional and Certified Information Privacy Manager designate her as thought leader in the field. She
is a former co-chair of the IAPP’s New Jersey Chapter and member of the Bankruptcy Lawyers Advisory
Committee for the District of New Jersey. As a member of the United States Trustee’s Consumer Privacy
Ombudsman (CPO) panel, she served as the CPO in the Golfsmith International chapter 11
cases. Previously she was counsel at Lowenstein Sandler LLP where, in addition to assisting clients with
data privacy-related issues, she also regularly represented debtors in possession and creditors in chapter
11 matters along with indigents in chapter 7 proceedings in association with the Volunteer Lawyers for
Justice. Prior to joining Lowenstein, she clerked for the Honorable Cecelia Morris, United States
Bankruptcy Judge for the Southern District of New York and was the Assistant Managing Attorney at
Kaye Scholer LLP.
44
45. About The Faculty
Kristin Garris - kgarris@wbny.com
Kristin G. Garris is a member of Warshaw Burstein, LLP's Intellectual Property practice group who has a
broad range of experience in handling matters related to trademark, copyright, Internet, and domain
name enforcement and litigation. Ms. Garris counsels clients on a wide range of intellectual property
issues, including IP ownership and protection, trademark enforcement and litigation, branding procedures
and management, copyright protection, licensing, domain names, privacy policies and website terms of
use, IP-related risk management, IP due diligence, data privacy regulations, and much more. She also
has significant experience with opposition and cancellation proceedings before the Trademark Trial and
Appeal Board of the U.S. Patent and Trademark Office. In addition, Ms. Garris is skilled in representing
clients with domain name disputes before the World Intellectual Property Organization’s Arbitration and
Mediation Center, as well as a broad range of other Internet-related disputes and trademark and
copyright enforcements in connection with social media. With twelve years of experience in intellectual
property, Ms. Garris is adept in representing clients with trademark and copyright litigation, design and
implementation of comprehensive enforcement programs, clearance and portfolio management,
registration strategies, and intellectual property due diligence in corporate transactions.
For more information, go to: https://www.financialpoise.com/webinar-faculty/kristin-garris/
45
46. About The Faculty
Michael Riela - Riela@thsh.com
Mike Riela is a partner in Tannenbaum Helpern’s Creditors’ Rights and Business Reorganization practice.
With more than 15 years of experience, Mike advises companies on complex restructuring, distressed
M&A, loan transactions and bankruptcy related litigation matters. Mike has in-depth experience in
advising clients on corporate and real estate bankruptcies, workouts, Chapter 11 and Chapter 7
bankruptcy cases, debtor-in-possession (DIP) and bankruptcy exit loan facilities, secondary market
trading of distressed debt and trade claims, Section 363 sales and bankruptcy retention and fee
agreements and disputes. His clients include banks, administrative agents, indenture trustees, hedge
funds, private equity firms, professional services firms, trade creditors, contract counterparties,
shareholders, debtors and investors. Mike has represented buyers of assets in Section 363 and out-of-
court sales from sellers such as Evergreen Solar, Inc., Sonic Telecommunications International, Ltd,
Urban Communicators PCS Limited Partnership, US Aggregate, Inc., and Vectrix Corporation, as well as
representing lenders, trustees and administrative agents in major Chapter 11 cases and workouts such
as Delta Air Lines, Inc., Extended Stay Inc., Buffets Inc., Legends Gaming LLC, Nortel Networks, Premier
International Holdings Inc., and many others.
46
47. Questions or Comments?
If you have any questions about this webinar that you did not get to ask during the live
premiere, or if you are watching this webinar On Demand, please do not hesitate to email us
at info@financialpoise.com with any questions or comments you may have. Please include
the name of the webinar in your email and we will do our best to provide a timely response.
IMPORTANT NOTE: The material in this presentation is for general educational purposes
only. It has been prepared primarily for attorneys and accountants for use in the pursuit of
their continuing legal education and continuing professional education.
47
48. About Financial Poise
48
Financial Poise™ has one mission: to provide
reliable plain English business, financial, and legal
education to individual investors, entrepreneurs,
business owners and executives.
Visit us at www.financialpoise.com
Our free weekly newsletter, Financial Poise
Weekly, updates you on new articles published
on our website and Upcoming Webinars you
may be interested in.
To join our email list, please visit:
https://www.financialpoise.com/subscribe/