SlideShare a Scribd company logo
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
2016 Central Ohio InfoSec Summit
Cybersecurity Act of 2015 & Other Hot Privacy and
Cybersecurity Topics
Heather Enlow-Novitsky
henovitsky@vorys.com
614-464-6226
Chris Ingram
clingram@vorys.com
614-464-5480
March 30, 2016
1
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Topics
1) Cybersecurity Act of 2015 – CISA
2) Proposed EU-US Privacy Shield
3) Encryption Wars & Mobile Devices
4) FTC’s Regulation of Unfair Cybersecurity Practices
2
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
3
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Cybersecurity Act of 2015
› Mechanism for sharing cybersecurity information
among private sector and federal entities
› Authorizes entities to monitor certain information
systems and operate defensive measures
› Provides safe harbors for liability
› DHS lead agency to manage sharing
4
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Definitions
› “Cyberthreat indicator”
• Information necessary to describe
or identify -
› Malicious reconnaissance
› Methods for defeating
security or exploiting
vulnerability
› Methods causing a user with
legitimate access to
unwittingly enable security
vulnerability
› Malicious cyber command
and control
› The actual or potential harm
caused
› “Defensive measures”
› Essentially a measure that detects,
prevents, or mitigates a known or
suspected cybersecurity threat or security
vulnerability
› Excludes “a measure that destroys,
renders unusable, provides unauthorized
access to, or substantially harms an
information system or information stored
on, processed by, or transiting such
information system not owned by:
• The private entity operating the measure; or
• Another entity or federal entity that is
authorized to provide consent and has provided
consent to that private entity for operation of
such measure.”
5
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA- Federal Sharing
› Federal agencies to issue procedures within 60 days to allow timely
sharing of cyberthreat indicators and defensive measures:
• Ensure real time sharing among federal agencies
• Incorporate existing processes, roles, and responsibilities (ISACs)
• Include rules and procedures for notifying entities that receive erroneous
information or where information is shared in violation of CISA
• Protect against unauthorized access to shared cyberthreat information
• Require removal of personal or personally identifiable information of
individuals not directly related to cybersecurity threat
6
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA - Nonfederal Sharing
› Authorizes nonfederal entities to share cyberthreat
indicators and defensive measures
› Classified information must be protected
› Must scrub PII not directly related to a cyberthreat prior
to sharing
› DHS was given 90 days to develop a process to accept
real time info. from nonfederal entities and to
automatically share with other federal agencies
7
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA - Use of Information
› Information received under CISA may be disclosed, retained
or used only for:
• Cybersecurity purpose
• Identifying cybersecurity threats or security vulnerabilities
• Responding to, preventing, or mitigating a specific threat of death,
physical or economic harm
• Responding to, investigating, prosecuting, preventing or mitigating a
serious threat to a minor or offense related to above; or
• Offenses relating to fraud, identity theft, espionage, censorship, or the
protection of trade secrets
8
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Safe Harbors for Private Entities
› No civil liability for sharing or receiving cyberthreat
indicators or defensive measures
› Shared information may not be used to regulate,
including in an enforcement action
• Can be used to inform the development of regulations of
information systems relating to the prevention or
mitigation of cybersecurity threats
9
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Safe Harbors for Private Entities
› No antitrust liability for private entities exchanging
cyberthreat indicators or defensive measures
› No waiver of privileges or protection (including
trade secret)
› No duty to share, warn or act, and no liability for not
sharing.
• Federal entities may not require sharing as a condition of
awarding any federal grant or contract
10
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Other Provisions
› Authorizes private entities to monitor and apply defensive
measures to their own information systems and others that
have provided written consent, including information
processed by or transmitted through those systems
• Does not authorize measures that destroy, render unusable, provide
unauthorized access to, or substantially harm an information system or
information not owned by the private entity or consenting entity
› Reporting requirements to Congress
› Broad preemption
› 10 year sunset provision
11
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Concerns Remain
› What standard of care will private entities be held to when
scrubbing data?
› Is the immunity given to private entities too broad or is it
insufficient?
› Should the types of information shared be limited?
› Should this be exempt from FOIA?
› Will this enable additional surveillance and/or
investigations unrelated to cybersecurity?
12
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
H.R. 4350 – CISA’s Demise?
13
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Sharing Data From Across the Pond
14
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU – Data Protection Directive
› Enacted in 1995 to protect personal data
• Restricts transfer of Europeans’ personal data to countries
outside of the European Economic Area
• New regulation anticipated this year
› The US Safe Harbor:
• Companies regulated by FTC or Dept. of Transportation
could opt in
• Self-certification process
• Public commitments enforced by FTC
15
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU – Data Protection Directive
› US Safe Harbor invalidated in
October 2015
› Austrian citizen complained
about his personal data on
facebook
› Argued that data is not protected
from surveillance by the
government
• Relied on Edward Snowden’s
allegations about the NSA
16
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Proposed EU-US Privacy Shield
› Proposed framework released Feb. 2, 2016
› Companies regulated by FTC (or other qualifying
federal agency) must:
1. Publicly commit to adhere to the Privacy Principles
2. Disclose privacy policy
3. Implement the Privacy Principles
› Certifications must be renewed annually
17
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Notice –
• Participation in Privacy Shield
• Type of data collected
• Purposes for collection
• Third parties’ use and
disclosure of data
• Available recourse
› Choice –
• Opt out must be clear and
conspicuous
• Opt in required for sensitive
information
› Race/ethnicity
› Political opinions
› Religious beliefs
› Health information
› Trade union membership
› Sexual orientation
18
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Accountability for data transferred to third parties:
• Contracts with third parties must require the third party to
provide same level of privacy protection as the Principles
• Third parties’ use of data must be consistent with users’
consent
• Must take reasonable and appropriate steps to ensure vendors
uphold Principles
• Must be able to cease data transmission to stop and remediate
misuse of data
19
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Security –
• Required to “take reasonable
and appropriate measures” to
protect data from unauthorized
access, loss, disclosure,
alteration or destruction
› Measures taken should be
balanced with the risks
involved in the processing
and the nature of the
personal data
› Data Integrity –
• Limits collection of personal
information to that which is
relevant for the purpose of
processing
• Prohibited from processing
personal information that is
incompatible with the purposes
for which it has been collected
or subsequently authorized by
the individual
20
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Access –
• Must enable individuals to
correct, amend or delete
inaccurate personal information
unless burden or expense
outweighs risks to the
individual’s privacy
› Recourse, Enforcement and
Liability –
• Individuals must be provided
use of a third party dispute
resolution body, free of charge,
to investigate and resolve
complaints of violations
• Ultimately, disputes can be
resolved through binding
arbitration
• Organization may remain liable
for vendors’ violations unless
the organization proves it was
not at fault
21
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield –
Not Approved Yet
› The EU’s representative bodies must still approve
the proposed text
› Recent encryption disputes concerning mobile
devices have threatened EU approval
22
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
23
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
› All Writs Act - 1789
› Permits a court, in its
“sound judgment” to
issue orders necessary
“to achieve the rational
ends of law” and “the
ends of justice entrusted
to it.”
24
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
› “The implications of the
government’s demands are
chilling.”
• Install surveillance software
• Access health records and financial
data
• Track your location
• Access the phone’s microphone or
camera
25
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
› States are considering bans on devices that would ban the
sale of full-disk encryption of smartphones
› California’s bill:
• Purpose – combat human trafficking/San Bernardino
• Scope – any smartphone sold or leased in CA after January 1,
2017
• Penalty – $2,500/phone against manufacturer or operating
system provider
26
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
Potential hurdles against states’ efforts:
› Dormant Commerce Clause
› Preemption – ENCRYPT Act (H.R. 4528)
“It is clear to me that creating a pathway for decryption only
for good guys is technologically stupid. You just can’t do that”
Rep. Ted Lieu (D-Calif.)
27
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC – Regulation of Unfair Cybersecurity
Practices
› FTC Act prohibits “unfair or deceptive acts or
practices in or affecting commerce.”
› Deception is typically tied to misrepresentations –
e.g., privacy policies
› FTC’s ability to regulate the fairness of
cybersecurity practices was affirmed in August 2015
28
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC v. Wyndham Worldwide Corp.
› More than $10.6 million in fraudulent charges
› Three separate intrusions in two years
• First intrusion – used brute-force to obtain administrator’s
username and password, then installed malware
• Second intrusion – used administrative account and
installed malware again
• Third intrusion – accessed servers that should have been
segmented from the Internet
29
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC v. Wyndham Worldwide Corp.
Alleged Security Flaws
› Payment card data stored in clear text
› Weak passwords/default passwords in environment
› Lacked firewalls at critical points in the network
› Failed to restrict specific IP addresses at all
› Lacked inventory of computers connected to the network
› Did not force security patches to connected computers
› Inadequate information security policies
› Did not limit duration of vendors’ access
› Failed to employ reasonable measures to detect and prevent unauthorized access
› Failed to follow proper incident response procedures – did not learn from prior
intrusions
30
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC – What Are Fair Cybersecurity
Practices?
1) Start with security
2) Control access to data sensibly
3) Require secure passwords/authentication
4) Sensitive personal information should be secured
5) Segment the network and monitor traffic
6) Restrict remote access
7) Apply security practices in product development
8) Manage service providers’ security measures
9) Keep security current
10) Secure media and devices
31
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Other Regulators Are Joining Cybersecurity
Chorus
1) Securities and Exchange Commission
• Assessing cybersecurity compliance and implementation is top
priority for 2016; recently issued $75,000 fine
2) Federal Communications Commission
• Issued nearly $26 million in fines in 2015 related to data
security practices
3) Consumer Financial Protection Bureau
• March 2, 2016 – levied $100,000 penalty for falsely advertising
that customer information was “safe” and “secure” and “PCI
compliant”
32
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
2016 Central Ohio InfoSec Summit
Cybersecurity Act of 2015 & Other Hot Privacy and
Cybersecurity Topics
Heather Enlow-Novitsky
henovitsky@vorys.com
614-464-6226
Chris Ingram
clingram@vorys.com
614-464-5480
March 30, 2016
33

More Related Content

What's hot

Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
James '​-- Mckinlay
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
James '​-- Mckinlay
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
Dan Michaluk
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Shawn Tuma
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
Idan Tohami
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
Dan Michaluk
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
Baltimax
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
Michelangelo van Dam
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Shawn Tuma
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
Peter Procházka
 
Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
Michael Scheidell
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
Naomi Holmes
 

What's hot (20)

Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 

Viewers also liked

Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
James Bryce Clark
 
Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012
Alfa Tech VestAsia Pte Ltd
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
Scalar Decisions
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
patmisasi
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
Chief Optimist
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker Entertainment
Scalar Decisions
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
Scalar Decisions
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
patmisasi
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
Scalar Decisions
 
12210943 pss7
12210943 pss712210943 pss7
12210943 pss7
EricNg0401
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Spredfast
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
Scalar Decisions
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
Scalar Decisions
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
Scalar Decisions
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
patmisasi
 

Viewers also liked (20)

Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging Brocade
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker Entertainment
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
12210943 pss7
12210943 pss712210943 pss7
12210943 pss7
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
 

Similar to Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
Shawn Tuma
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
Rachel Aldighieri
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
Jason Haislmaier
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
ipspat
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
Robert MacLean
 
Big Data
Big DataBig Data
Big Data
cadmef
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
Owako Rodah
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
Kenneth Riley
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
shekharkanodia
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
TrustArc
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Shawn Tuma
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
Internet Law Center
 

Similar to Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics (20)

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Big Data
Big DataBig Data
Big Data
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 

More from centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
centralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
centralohioissa
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
centralohioissa
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
centralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
centralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
centralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
centralohioissa
 

More from centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 

Recently uploaded

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics

  • 1. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® 2016 Central Ohio InfoSec Summit Cybersecurity Act of 2015 & Other Hot Privacy and Cybersecurity Topics Heather Enlow-Novitsky henovitsky@vorys.com 614-464-6226 Chris Ingram clingram@vorys.com 614-464-5480 March 30, 2016 1
  • 2. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Topics 1) Cybersecurity Act of 2015 – CISA 2) Proposed EU-US Privacy Shield 3) Encryption Wars & Mobile Devices 4) FTC’s Regulation of Unfair Cybersecurity Practices 2
  • 3. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® 3
  • 4. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Cybersecurity Act of 2015 › Mechanism for sharing cybersecurity information among private sector and federal entities › Authorizes entities to monitor certain information systems and operate defensive measures › Provides safe harbors for liability › DHS lead agency to manage sharing 4
  • 5. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Definitions › “Cyberthreat indicator” • Information necessary to describe or identify - › Malicious reconnaissance › Methods for defeating security or exploiting vulnerability › Methods causing a user with legitimate access to unwittingly enable security vulnerability › Malicious cyber command and control › The actual or potential harm caused › “Defensive measures” › Essentially a measure that detects, prevents, or mitigates a known or suspected cybersecurity threat or security vulnerability › Excludes “a measure that destroys, renders unusable, provides unauthorized access to, or substantially harms an information system or information stored on, processed by, or transiting such information system not owned by: • The private entity operating the measure; or • Another entity or federal entity that is authorized to provide consent and has provided consent to that private entity for operation of such measure.” 5
  • 6. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA- Federal Sharing › Federal agencies to issue procedures within 60 days to allow timely sharing of cyberthreat indicators and defensive measures: • Ensure real time sharing among federal agencies • Incorporate existing processes, roles, and responsibilities (ISACs) • Include rules and procedures for notifying entities that receive erroneous information or where information is shared in violation of CISA • Protect against unauthorized access to shared cyberthreat information • Require removal of personal or personally identifiable information of individuals not directly related to cybersecurity threat 6
  • 7. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA - Nonfederal Sharing › Authorizes nonfederal entities to share cyberthreat indicators and defensive measures › Classified information must be protected › Must scrub PII not directly related to a cyberthreat prior to sharing › DHS was given 90 days to develop a process to accept real time info. from nonfederal entities and to automatically share with other federal agencies 7
  • 8. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA - Use of Information › Information received under CISA may be disclosed, retained or used only for: • Cybersecurity purpose • Identifying cybersecurity threats or security vulnerabilities • Responding to, preventing, or mitigating a specific threat of death, physical or economic harm • Responding to, investigating, prosecuting, preventing or mitigating a serious threat to a minor or offense related to above; or • Offenses relating to fraud, identity theft, espionage, censorship, or the protection of trade secrets 8
  • 9. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Safe Harbors for Private Entities › No civil liability for sharing or receiving cyberthreat indicators or defensive measures › Shared information may not be used to regulate, including in an enforcement action • Can be used to inform the development of regulations of information systems relating to the prevention or mitigation of cybersecurity threats 9
  • 10. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Safe Harbors for Private Entities › No antitrust liability for private entities exchanging cyberthreat indicators or defensive measures › No waiver of privileges or protection (including trade secret) › No duty to share, warn or act, and no liability for not sharing. • Federal entities may not require sharing as a condition of awarding any federal grant or contract 10
  • 11. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Other Provisions › Authorizes private entities to monitor and apply defensive measures to their own information systems and others that have provided written consent, including information processed by or transmitted through those systems • Does not authorize measures that destroy, render unusable, provide unauthorized access to, or substantially harm an information system or information not owned by the private entity or consenting entity › Reporting requirements to Congress › Broad preemption › 10 year sunset provision 11
  • 12. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Concerns Remain › What standard of care will private entities be held to when scrubbing data? › Is the immunity given to private entities too broad or is it insufficient? › Should the types of information shared be limited? › Should this be exempt from FOIA? › Will this enable additional surveillance and/or investigations unrelated to cybersecurity? 12
  • 13. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® H.R. 4350 – CISA’s Demise? 13
  • 14. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Sharing Data From Across the Pond 14
  • 15. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU – Data Protection Directive › Enacted in 1995 to protect personal data • Restricts transfer of Europeans’ personal data to countries outside of the European Economic Area • New regulation anticipated this year › The US Safe Harbor: • Companies regulated by FTC or Dept. of Transportation could opt in • Self-certification process • Public commitments enforced by FTC 15
  • 16. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU – Data Protection Directive › US Safe Harbor invalidated in October 2015 › Austrian citizen complained about his personal data on facebook › Argued that data is not protected from surveillance by the government • Relied on Edward Snowden’s allegations about the NSA 16
  • 17. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Proposed EU-US Privacy Shield › Proposed framework released Feb. 2, 2016 › Companies regulated by FTC (or other qualifying federal agency) must: 1. Publicly commit to adhere to the Privacy Principles 2. Disclose privacy policy 3. Implement the Privacy Principles › Certifications must be renewed annually 17
  • 18. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Notice – • Participation in Privacy Shield • Type of data collected • Purposes for collection • Third parties’ use and disclosure of data • Available recourse › Choice – • Opt out must be clear and conspicuous • Opt in required for sensitive information › Race/ethnicity › Political opinions › Religious beliefs › Health information › Trade union membership › Sexual orientation 18
  • 19. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Accountability for data transferred to third parties: • Contracts with third parties must require the third party to provide same level of privacy protection as the Principles • Third parties’ use of data must be consistent with users’ consent • Must take reasonable and appropriate steps to ensure vendors uphold Principles • Must be able to cease data transmission to stop and remediate misuse of data 19
  • 20. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Security – • Required to “take reasonable and appropriate measures” to protect data from unauthorized access, loss, disclosure, alteration or destruction › Measures taken should be balanced with the risks involved in the processing and the nature of the personal data › Data Integrity – • Limits collection of personal information to that which is relevant for the purpose of processing • Prohibited from processing personal information that is incompatible with the purposes for which it has been collected or subsequently authorized by the individual 20
  • 21. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Access – • Must enable individuals to correct, amend or delete inaccurate personal information unless burden or expense outweighs risks to the individual’s privacy › Recourse, Enforcement and Liability – • Individuals must be provided use of a third party dispute resolution body, free of charge, to investigate and resolve complaints of violations • Ultimately, disputes can be resolved through binding arbitration • Organization may remain liable for vendors’ violations unless the organization proves it was not at fault 21
  • 22. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Not Approved Yet › The EU’s representative bodies must still approve the proposed text › Recent encryption disputes concerning mobile devices have threatened EU approval 22
  • 23. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones 23
  • 24. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones › All Writs Act - 1789 › Permits a court, in its “sound judgment” to issue orders necessary “to achieve the rational ends of law” and “the ends of justice entrusted to it.” 24
  • 25. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones › “The implications of the government’s demands are chilling.” • Install surveillance software • Access health records and financial data • Track your location • Access the phone’s microphone or camera 25
  • 26. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones › States are considering bans on devices that would ban the sale of full-disk encryption of smartphones › California’s bill: • Purpose – combat human trafficking/San Bernardino • Scope – any smartphone sold or leased in CA after January 1, 2017 • Penalty – $2,500/phone against manufacturer or operating system provider 26
  • 27. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones Potential hurdles against states’ efforts: › Dormant Commerce Clause › Preemption – ENCRYPT Act (H.R. 4528) “It is clear to me that creating a pathway for decryption only for good guys is technologically stupid. You just can’t do that” Rep. Ted Lieu (D-Calif.) 27
  • 28. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC – Regulation of Unfair Cybersecurity Practices › FTC Act prohibits “unfair or deceptive acts or practices in or affecting commerce.” › Deception is typically tied to misrepresentations – e.g., privacy policies › FTC’s ability to regulate the fairness of cybersecurity practices was affirmed in August 2015 28
  • 29. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC v. Wyndham Worldwide Corp. › More than $10.6 million in fraudulent charges › Three separate intrusions in two years • First intrusion – used brute-force to obtain administrator’s username and password, then installed malware • Second intrusion – used administrative account and installed malware again • Third intrusion – accessed servers that should have been segmented from the Internet 29
  • 30. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC v. Wyndham Worldwide Corp. Alleged Security Flaws › Payment card data stored in clear text › Weak passwords/default passwords in environment › Lacked firewalls at critical points in the network › Failed to restrict specific IP addresses at all › Lacked inventory of computers connected to the network › Did not force security patches to connected computers › Inadequate information security policies › Did not limit duration of vendors’ access › Failed to employ reasonable measures to detect and prevent unauthorized access › Failed to follow proper incident response procedures – did not learn from prior intrusions 30
  • 31. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC – What Are Fair Cybersecurity Practices? 1) Start with security 2) Control access to data sensibly 3) Require secure passwords/authentication 4) Sensitive personal information should be secured 5) Segment the network and monitor traffic 6) Restrict remote access 7) Apply security practices in product development 8) Manage service providers’ security measures 9) Keep security current 10) Secure media and devices 31
  • 32. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Other Regulators Are Joining Cybersecurity Chorus 1) Securities and Exchange Commission • Assessing cybersecurity compliance and implementation is top priority for 2016; recently issued $75,000 fine 2) Federal Communications Commission • Issued nearly $26 million in fines in 2015 related to data security practices 3) Consumer Financial Protection Bureau • March 2, 2016 – levied $100,000 penalty for falsely advertising that customer information was “safe” and “secure” and “PCI compliant” 32
  • 33. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® 2016 Central Ohio InfoSec Summit Cybersecurity Act of 2015 & Other Hot Privacy and Cybersecurity Topics Heather Enlow-Novitsky henovitsky@vorys.com 614-464-6226 Chris Ingram clingram@vorys.com 614-464-5480 March 30, 2016 33