SlideShare a Scribd company logo
1 of 39
MA Privacy Law Overview:  Standards for the Protection of Personal Information of Residents of the Commonwealth Thursday, May 7, 2009 2:00 – 2:50 p.m. EDT
Our Presenters Travis M. Drouin, CPA, CIA   Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting
Scoping the Massachusetts Privacy Law
A Perspective: Identity Theft Facts ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
A Perspective: Identity Theft Facts ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Landmark Breaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
The Origins of the Massachusetts Law ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Defining the Massachusetts Privacy Law 201 CMR 17.00
New Massachusetts Privacy and Data Protection Law ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],New Massachusetts Privacy and Data Protection Law Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],New Massachusetts Privacy and Data Protection Law Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Compliance Dates ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Failure to Comply $$ ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Other Consequences of  Non-Compliance ,[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Becoming Compliant Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Steps to Achieve Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved . Information Process Flow
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the  Organization ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 3:  Assessing 3 rd  Party Vendors, Training Employees & Monitoring Compliance Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 3:  Assessing 3 rd  Party Vendors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 4:  Training Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 5:  Monitoring Compliance ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Questions for our presenters? Travis M. Drouin, CPA, CIA   Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting

More Related Content

What's hot

Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And KeyYarko Petriw
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityRachel Hamilton
 
California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?Lumension
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspacetimmcguinness
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareNationalUnderwriter
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 

What's hot (20)

201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And Key
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 

Similar to MA Privacy Law

Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawIreneWachsler
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Craig Rispin
 

Similar to MA Privacy Law (20)

Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy Law
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 

More from travismd

Stock Based Compensation
Stock Based CompensationStock Based Compensation
Stock Based Compensationtravismd
 
Social Media Presentation To Spc
Social Media Presentation To SpcSocial Media Presentation To Spc
Social Media Presentation To Spctravismd
 
Preparing For IFRS - An Update
Preparing For IFRS - An UpdatePreparing For IFRS - An Update
Preparing For IFRS - An Updatetravismd
 
FMA of NH May 19, 2009
FMA of NH May 19, 2009FMA of NH May 19, 2009
FMA of NH May 19, 2009travismd
 
The Power of Networking
The Power of NetworkingThe Power of Networking
The Power of Networkingtravismd
 
FMA of NH: Safeguarding Cash
FMA of NH: Safeguarding CashFMA of NH: Safeguarding Cash
FMA of NH: Safeguarding Cashtravismd
 
FMA of NH: Preparing for a Successful Liquidity Event
FMA of NH:  Preparing for a Successful Liquidity EventFMA of NH:  Preparing for a Successful Liquidity Event
FMA of NH: Preparing for a Successful Liquidity Eventtravismd
 
Preparing For IFRS
Preparing For IFRSPreparing For IFRS
Preparing For IFRStravismd
 
Other FASB Updates
Other FASB UpdatesOther FASB Updates
Other FASB Updatestravismd
 
IFRS Perspective
IFRS PerspectiveIFRS Perspective
IFRS Perspectivetravismd
 
J-Sox Perspective
J-Sox PerspectiveJ-Sox Perspective
J-Sox Perspectivetravismd
 

More from travismd (11)

Stock Based Compensation
Stock Based CompensationStock Based Compensation
Stock Based Compensation
 
Social Media Presentation To Spc
Social Media Presentation To SpcSocial Media Presentation To Spc
Social Media Presentation To Spc
 
Preparing For IFRS - An Update
Preparing For IFRS - An UpdatePreparing For IFRS - An Update
Preparing For IFRS - An Update
 
FMA of NH May 19, 2009
FMA of NH May 19, 2009FMA of NH May 19, 2009
FMA of NH May 19, 2009
 
The Power of Networking
The Power of NetworkingThe Power of Networking
The Power of Networking
 
FMA of NH: Safeguarding Cash
FMA of NH: Safeguarding CashFMA of NH: Safeguarding Cash
FMA of NH: Safeguarding Cash
 
FMA of NH: Preparing for a Successful Liquidity Event
FMA of NH:  Preparing for a Successful Liquidity EventFMA of NH:  Preparing for a Successful Liquidity Event
FMA of NH: Preparing for a Successful Liquidity Event
 
Preparing For IFRS
Preparing For IFRSPreparing For IFRS
Preparing For IFRS
 
Other FASB Updates
Other FASB UpdatesOther FASB Updates
Other FASB Updates
 
IFRS Perspective
IFRS PerspectiveIFRS Perspective
IFRS Perspective
 
J-Sox Perspective
J-Sox PerspectiveJ-Sox Perspective
J-Sox Perspective
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

MA Privacy Law

  • 1. MA Privacy Law Overview: Standards for the Protection of Personal Information of Residents of the Commonwealth Thursday, May 7, 2009 2:00 – 2:50 p.m. EDT
  • 2. Our Presenters Travis M. Drouin, CPA, CIA Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Defining the Massachusetts Privacy Law 201 CMR 17.00
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Becoming Compliant Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 16.
  • 17. Step 1: Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 18.
  • 19.
  • 20. Step 1: Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved . Information Process Flow
  • 21.
  • 22.
  • 23.
  • 24. Step 2: Encryption & Data Protection Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Step 3: Assessing 3 rd Party Vendors, Training Employees & Monitoring Compliance Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 36.
  • 37.
  • 38.
  • 39. Questions for our presenters? Travis M. Drouin, CPA, CIA Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting