SlideShare a Scribd company logo
ESPIONAGEM E
MÍDIAS SOCIAIS:
ONDE ESTÃO SEUS DADOS AGORA ?
Moderated by:
Fernando M. Pinguelo, Esq.
Norris McLaughlin & Marcus, P.A.
Panelists:
Lara A. Ballard, Special Advisor for Privacy and Technology, United
States State Department
Edson Perin, Columnist, ELDORADO RADIO; author of IT For Business
Seth B. Kosto, Assistant U.S. Attorney, Department of Justice,
Computer Hacking and Intellectual Property Section
Email Questions
info@eLLblog.com
Tweet the Panel!
@ellblog_dot_com
Realidade de hoje
• Criminals are after corporate information, and increasingly, social
media sites are where they look to steal proprietary business data,
including personal data of employees and customers, proprietary
company data, and sensitive intellectual property – all found on
SOCIAL MEDIA.
• Data security breaches cost billions in fines, notification of data
subjects, governmental investigations and/or prosecution, loss of
business reputation, credibility, and loss of proprietary information,
trade secrets, and IP
• Will your company be the next headline? How do you respond?
Lara A. Ballard
Special Advisor, Privacy & Technology
• Office of Communications and Information Policy, Bureau of Economic, Energy and
Business Affairs, U.S. State Department
• Litigated claims in the Iran-U.S. Claims Tribunal and advised Bureau of Political-
Military Affairs on arms export control & various aspects of international criminal law.
• Defended the Department before the Equal Employment Opportunity Commission in
federal court.
• Most recently, served as the Department’s primary source of legal advice on a wide
variety of privacy and technology issues. Helped draft the Department’s guidance on
use of social media and provided legal advice to the administrators and designers of
the Sounding Board.
• Served as the Department’s primary representative to several interagency groups
dealing with issues related to privacy, surveillance, and global Internet freedom.
• Prior to her arrival at the State Department, she clerked for the late Hon. Fred I.
Parker, U.S. Court of Appeals for the Second Circuit. She is a graduate of Columbia
Law School and Georgetown University School of Foreign Service
• Served on active duty in the U.S. Army Air Defense Artillery Germany, leaving in 1995
with the rank of Captain.
Edson Perin
Columnist and Author
• Noted Columnist, ELDORADO RADIO
• Author of IT For Business
Seth B. Kosto
Assistant U.S. Attorney
Department of Justice, Computer Hacking and Intellectual Property Section
• Served as an Assistant United States Attorney in New Jersey since 2005.
Responsible for investigating and prosecuting computer crime and intellectual
property matters, including instances of hacking, computer intrusions, insider threats,
phishing and identity theft, and botnets.
• Part of prosecution team that indicted and convicted Albert Gonzalez, who received a
20-year prison sentence for conspiring with others to hack into Heartland Payment
Systems, 7-11, and other national corporations to steal credit and debit card data.
• Recipient of the prestigious Distinguished Service Award in October 2010.
• Recently secured the conviction of three men charged with using fraud techniques
and computer software to gain unauthorized access to millions of concert, sporting,
and event tickets.
• Other cyber matters include the conviction of an employee who deleted his former
employer’s computer network after being laid off; defendant who bribed customs
officials to further the importation of counterfeit luxury goods; and members of an
international bank fraud/identity theft ring that drained millions of dollars from victims’
home equity lines of credit.
• Graduate: Yale College and Boston College Law School.
Fernando M. Pinguelo, Esq.
• Trial Lawyer, licensed to practice law in the United States (New York,
Washington, D.C., and New Jersey)
• Partner at Norris McLaughlin & Marcus and Co-Chair of its Response to
Electronic Discovery and Information Group
• Experience in all facets of litigation (trial, mediation, and appellate) in both
federal and state courts. As a former prosecutor, tried numerous cases.
• Today, handles a broad spectrum of disputes including copyright
infringement, misappropriation of trade secrets, fraud, breach of non-
compete covenants, and business torts
• A leader in the emerging areas of electronic discovery and cyber law, works
with business owners and executives to develop strategies to manage
business and legal issues related to electronic documents and security
• Recently, the Fulbright Program, the U.S. government's international
exchange program, designated him a Fulbright Specialist for work in
eDiscovery; and he is guest lecturer at Mackenzie University and Fundação
Getulio Vargas
ESPIONAGEM E MÍDIAS SOCIAIS:
ONDE ESTÃO SEUS DADOS AGORA
?
PROGRAM OVERVIEW
• Discuss vulnerabilities and legal implications that employee social
media use creates for companies, making them more susceptible to
corporate espionage.
• General overview of social media, acceptable and necessary uses,
and the risks it creates.
• Addresses problems created by an employee’s natural inclination to
“bare all” on social media, and the negative consequences that
could have for the person’s employer.
• Use of social media to track a competitor: From acceptable DUE
DILIGENCE to CYBERCRIME
– Examples of acceptable DUE DILIGENCE
– Examples of unacceptable CYBERCRIME
ESPIONAGEM E MÍDIAS SOCIAIS:
ONDE ESTÃO SEUS DADOS AGORA
?
PROGRAM OVERVIEW (contínuo)
• Methods & Strategies businesses can develop to police employee
social media usage without sacrificing benefits and alienating
employees.
– Social Media Written Policies
– Monitoring and enforcement
• U.S. Federal Investigations/Prosecutions:
– Latest trends in cyber crimes (similarities & differences with past crimes)
– Trends in criminal enterprises’ use of social media information
– Government/business initiatives and programs to foster collaboration
and defenses against threats
• Trends toward greater data protection and encryption requirements
as global commerce follows advances in communications and social
media technology
• The role the media plays in breach notification
Corporate Espionage
Definition:
Clandestine techniques used to
steal valuable information from
businesses.
Perguntas?
OBRIGADO
• To receive a copy of
Social Media: A Corporate Spy’s Best
“Friend”: How employee social media
use may expose your company to cyber-
vulnerability, email:
info@NYLocalLaw.com
Informações de Contato
• Fernando M. Pinguelo, Esq.
– Norris McLaughlin & Marcus, P.A., 875 Third Avenue,
8th Floor, New York, NY 10022, Phone: 908-252-
4128, fmp@nmmlaw.com
• Lara A. Ballard, Special Advisor for Privacy and
Technology, United States State Department
• Edson Perin, Columnist, ELDORADO RADIO; author of
IT For Business
• Seth B. Kosto, Assistant U.S. Attorney, Department of
Justice, Computer Hacking and Intellectual Property
Section

More Related Content

What's hot

CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
Internet Law Center
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
YUSRA FERNANDO
 
Digital law
Digital lawDigital law
Digital law
BrunsUSD15
 
Digital law
Digital lawDigital law
Digital law
BrunsUSD15
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Eric Vanderburg
 
Review questions
Review questionsReview questions
Review questions
Anura Kumara
 
Professionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS OntarioProfessionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS Ontario
Lou Milrad
 
Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breach
Rob Jackson
 
Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?
IQPC Exchange
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
SaimaRafiq
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
Carlos Gonsalves
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
blogzilla
 
Digital law
Digital lawDigital law
Digital law
CAQUES01
 
Digital law
Digital lawDigital law
Digital law
makylahh
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
Shane Tilton
 

What's hot (20)

CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Review questions
Review questionsReview questions
Review questions
 
Professionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS OntarioProfessionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS Ontario
 
Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breach
 
Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
 

Similar to III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin

Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
Ernest (E.J.) Hilbert
 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
MuhammadAbdullah201796
 
Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technology
Rakesh Mehta
 
Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015
Timothy Nolan
 
cyber crime
cyber crimecyber crime
cyber crime
Akash Mehta
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx
vickeryr87
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
Glenn E. Davis
 
Rfc combined resume 6 22-2017
Rfc combined resume 6 22-2017Rfc combined resume 6 22-2017
Rfc combined resume 6 22-2017
Robert Copple, J.D., Ph.D.
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
haynormania
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
Dr. Lydia Kostopoulos
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
fatimagull32
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
Association for Project Management
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
zyleflorence
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
zyleflorence
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
Medpricer
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
Medpricer
 

Similar to III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin (20)

Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
E commerce
E commerce E commerce
E commerce
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technology
 
Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015
 
cyber crime
cyber crimecyber crime
cyber crime
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Rfc combined resume 6 22-2017
Rfc combined resume 6 22-2017Rfc combined resume 6 22-2017
Rfc combined resume 6 22-2017
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
 

More from FecomercioSP

irbem 2015 indicadores-sp_completa
irbem 2015  indicadores-sp_completairbem 2015  indicadores-sp_completa
irbem 2015 indicadores-sp_completa
FecomercioSP
 
irbem 2015 indicadores-sp ppt
irbem 2015  indicadores-sp pptirbem 2015  indicadores-sp ppt
irbem 2015 indicadores-sp ppt
FecomercioSP
 
Apresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaApresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia Esmeralda
FecomercioSP
 
Apresentação Renato Dolci
Apresentação Renato Dolci   Apresentação Renato Dolci
Apresentação Renato Dolci
FecomercioSP
 
Dados e tendências sobre e-commerce
Dados e tendências sobre e-commerceDados e tendências sobre e-commerce
Dados e tendências sobre e-commerce
FecomercioSP
 
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
FecomercioSP
 
A dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroA dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiro
FecomercioSP
 
Apresentação Anny Matumura - EY
Apresentação Anny Matumura - EYApresentação Anny Matumura - EY
Apresentação Anny Matumura - EY
FecomercioSP
 
Apresentação Pesquisa Internet - Viviânne Martins
Apresentação Pesquisa Internet  - Viviânne MartinsApresentação Pesquisa Internet  - Viviânne Martins
Apresentação Pesquisa Internet - Viviânne Martins
FecomercioSP
 
Apresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoApresentação Pesquisa de Emprego
Apresentação Pesquisa de Emprego
FecomercioSP
 
Apresentação Viviânne Martins
Apresentação Viviânne MartinsApresentação Viviânne Martins
Apresentação Viviânne Martins
FecomercioSP
 
Apresentação Antonio Borges
Apresentação Antonio BorgesApresentação Antonio Borges
Apresentação Antonio Borges
FecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoReforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
FecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaReforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
FecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoReforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
FecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielReforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
FecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
FecomercioSP
 
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
FecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
FecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
FecomercioSP
 

More from FecomercioSP (20)

irbem 2015 indicadores-sp_completa
irbem 2015  indicadores-sp_completairbem 2015  indicadores-sp_completa
irbem 2015 indicadores-sp_completa
 
irbem 2015 indicadores-sp ppt
irbem 2015  indicadores-sp pptirbem 2015  indicadores-sp ppt
irbem 2015 indicadores-sp ppt
 
Apresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaApresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia Esmeralda
 
Apresentação Renato Dolci
Apresentação Renato Dolci   Apresentação Renato Dolci
Apresentação Renato Dolci
 
Dados e tendências sobre e-commerce
Dados e tendências sobre e-commerceDados e tendências sobre e-commerce
Dados e tendências sobre e-commerce
 
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
 
A dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroA dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiro
 
Apresentação Anny Matumura - EY
Apresentação Anny Matumura - EYApresentação Anny Matumura - EY
Apresentação Anny Matumura - EY
 
Apresentação Pesquisa Internet - Viviânne Martins
Apresentação Pesquisa Internet  - Viviânne MartinsApresentação Pesquisa Internet  - Viviânne Martins
Apresentação Pesquisa Internet - Viviânne Martins
 
Apresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoApresentação Pesquisa de Emprego
Apresentação Pesquisa de Emprego
 
Apresentação Viviânne Martins
Apresentação Viviânne MartinsApresentação Viviânne Martins
Apresentação Viviânne Martins
 
Apresentação Antonio Borges
Apresentação Antonio BorgesApresentação Antonio Borges
Apresentação Antonio Borges
 
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoReforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
 
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaReforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
 
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoReforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
 
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielReforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 

III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin

  • 1. ESPIONAGEM E MÍDIAS SOCIAIS: ONDE ESTÃO SEUS DADOS AGORA ? Moderated by: Fernando M. Pinguelo, Esq. Norris McLaughlin & Marcus, P.A. Panelists: Lara A. Ballard, Special Advisor for Privacy and Technology, United States State Department Edson Perin, Columnist, ELDORADO RADIO; author of IT For Business Seth B. Kosto, Assistant U.S. Attorney, Department of Justice, Computer Hacking and Intellectual Property Section
  • 4. Realidade de hoje • Criminals are after corporate information, and increasingly, social media sites are where they look to steal proprietary business data, including personal data of employees and customers, proprietary company data, and sensitive intellectual property – all found on SOCIAL MEDIA. • Data security breaches cost billions in fines, notification of data subjects, governmental investigations and/or prosecution, loss of business reputation, credibility, and loss of proprietary information, trade secrets, and IP • Will your company be the next headline? How do you respond?
  • 5. Lara A. Ballard Special Advisor, Privacy & Technology • Office of Communications and Information Policy, Bureau of Economic, Energy and Business Affairs, U.S. State Department • Litigated claims in the Iran-U.S. Claims Tribunal and advised Bureau of Political- Military Affairs on arms export control & various aspects of international criminal law. • Defended the Department before the Equal Employment Opportunity Commission in federal court. • Most recently, served as the Department’s primary source of legal advice on a wide variety of privacy and technology issues. Helped draft the Department’s guidance on use of social media and provided legal advice to the administrators and designers of the Sounding Board. • Served as the Department’s primary representative to several interagency groups dealing with issues related to privacy, surveillance, and global Internet freedom. • Prior to her arrival at the State Department, she clerked for the late Hon. Fred I. Parker, U.S. Court of Appeals for the Second Circuit. She is a graduate of Columbia Law School and Georgetown University School of Foreign Service • Served on active duty in the U.S. Army Air Defense Artillery Germany, leaving in 1995 with the rank of Captain.
  • 6. Edson Perin Columnist and Author • Noted Columnist, ELDORADO RADIO • Author of IT For Business
  • 7. Seth B. Kosto Assistant U.S. Attorney Department of Justice, Computer Hacking and Intellectual Property Section • Served as an Assistant United States Attorney in New Jersey since 2005. Responsible for investigating and prosecuting computer crime and intellectual property matters, including instances of hacking, computer intrusions, insider threats, phishing and identity theft, and botnets. • Part of prosecution team that indicted and convicted Albert Gonzalez, who received a 20-year prison sentence for conspiring with others to hack into Heartland Payment Systems, 7-11, and other national corporations to steal credit and debit card data. • Recipient of the prestigious Distinguished Service Award in October 2010. • Recently secured the conviction of three men charged with using fraud techniques and computer software to gain unauthorized access to millions of concert, sporting, and event tickets. • Other cyber matters include the conviction of an employee who deleted his former employer’s computer network after being laid off; defendant who bribed customs officials to further the importation of counterfeit luxury goods; and members of an international bank fraud/identity theft ring that drained millions of dollars from victims’ home equity lines of credit. • Graduate: Yale College and Boston College Law School.
  • 8. Fernando M. Pinguelo, Esq. • Trial Lawyer, licensed to practice law in the United States (New York, Washington, D.C., and New Jersey) • Partner at Norris McLaughlin & Marcus and Co-Chair of its Response to Electronic Discovery and Information Group • Experience in all facets of litigation (trial, mediation, and appellate) in both federal and state courts. As a former prosecutor, tried numerous cases. • Today, handles a broad spectrum of disputes including copyright infringement, misappropriation of trade secrets, fraud, breach of non- compete covenants, and business torts • A leader in the emerging areas of electronic discovery and cyber law, works with business owners and executives to develop strategies to manage business and legal issues related to electronic documents and security • Recently, the Fulbright Program, the U.S. government's international exchange program, designated him a Fulbright Specialist for work in eDiscovery; and he is guest lecturer at Mackenzie University and Fundação Getulio Vargas
  • 9. ESPIONAGEM E MÍDIAS SOCIAIS: ONDE ESTÃO SEUS DADOS AGORA ? PROGRAM OVERVIEW • Discuss vulnerabilities and legal implications that employee social media use creates for companies, making them more susceptible to corporate espionage. • General overview of social media, acceptable and necessary uses, and the risks it creates. • Addresses problems created by an employee’s natural inclination to “bare all” on social media, and the negative consequences that could have for the person’s employer. • Use of social media to track a competitor: From acceptable DUE DILIGENCE to CYBERCRIME – Examples of acceptable DUE DILIGENCE – Examples of unacceptable CYBERCRIME
  • 10. ESPIONAGEM E MÍDIAS SOCIAIS: ONDE ESTÃO SEUS DADOS AGORA ? PROGRAM OVERVIEW (contínuo) • Methods & Strategies businesses can develop to police employee social media usage without sacrificing benefits and alienating employees. – Social Media Written Policies – Monitoring and enforcement • U.S. Federal Investigations/Prosecutions: – Latest trends in cyber crimes (similarities & differences with past crimes) – Trends in criminal enterprises’ use of social media information – Government/business initiatives and programs to foster collaboration and defenses against threats • Trends toward greater data protection and encryption requirements as global commerce follows advances in communications and social media technology • The role the media plays in breach notification
  • 11. Corporate Espionage Definition: Clandestine techniques used to steal valuable information from businesses.
  • 13. OBRIGADO • To receive a copy of Social Media: A Corporate Spy’s Best “Friend”: How employee social media use may expose your company to cyber- vulnerability, email: info@NYLocalLaw.com
  • 14. Informações de Contato • Fernando M. Pinguelo, Esq. – Norris McLaughlin & Marcus, P.A., 875 Third Avenue, 8th Floor, New York, NY 10022, Phone: 908-252- 4128, fmp@nmmlaw.com • Lara A. Ballard, Special Advisor for Privacy and Technology, United States State Department • Edson Perin, Columnist, ELDORADO RADIO; author of IT For Business • Seth B. Kosto, Assistant U.S. Attorney, Department of Justice, Computer Hacking and Intellectual Property Section