SlideShare a Scribd company logo
www.nicsa.org
Privilege and Proprietary
Information in the Digital Age
Are You As Protected As You Think?
www.nicsa.org
DISCUSSION TOPICS
• What is attorney-client privileged – and what
is not?
• Kenny v. PIMCO Ruling
• Chill v. Calamos Ruling
• Digital communications and boards
• Protecting confidential information from
cybersecurity breaches
• Some key takeaways
www.nicsa.org
What is Attorney-Client Privileged–
And What is Not?
A. What it is in context of board communications
 Must include advice
B. What/who is traditionally covered
 Communications between a client and his or her attorney
C. What may not be protected
 Certain types of communication with independent trustee counsel
 Communications with fund management, fund counsel
D. Attorney work-product doctrine
 Developed while representing a client and in anticipation of litigation
E. Waiver of privilege
 Be wary of inadvertently waiving
F. How SEC staff views the exercise of privilege—then and now
www.nicsa.org
The Kenny v. PIMCO Ruling
A. A “district court” ruling from the Western Dist. of Wash. in the 9th
Appellate Circuit.
B. The court ruled for plaintiff that the attorney client privilege did not
apply to communications between the Independent Trustees of the Fund
and Fund counsel.
C. The court used the “fiduciary exception” to support its ruling and applied
two theories:
1. The “Real Client” Theory
2. The “Duty to Inform” Theory
D. DBR’s view – this appears to be a misapplication of these legal theories.
Historically, these theories had been only been applied by courts to
traditional trustee-beneficiary relationships and not in the investment
company context.
www.nicsa.org
The Kenny v. PIMCO Ruling
E. This type of ruling can serve as motivation to the plaintiff’s bar. Indeed,
two recent motions from cases serve as examples:
1. Obeslo, et al. v. Great-West Life and Annuity Ins. Co., et al., pending in the
Dist. of Colorado.
2. Chill v. Calamos Investment Trust, et al., filed in the Northern Dist. of Illinois.
F. Practice Points:
• Treat every communication as if it could potentially be discoverable.
• Benefits of phone calls.
www.nicsa.org
The Chill v. Calamos Ruling
A. The Trust and Trustees were not named as defendants in the underlying
case pending in the Southern Dist. of N.Y. They reside in the Northern Dist.
of Ill., where plaintiffs filed the motion.
B. Like Kenny, plaintiffs sought the production of documents claimed to be
privileged based on the “fiduciary exception.”
C. Respondents did not dispute the application of this exception, but argued
that the second element of the application of this exception needed to be
applied.
1. Plaintiff has the burden to establish “good cause” to overcome the privilege.
2. Several factors establish good cause – including the most important – the
necessity of the privileged information versus its availability from other
sources.
www.nicsa.org
The Chill v. Calamos Ruling
D. In ruling in the Trust’s and the Independent Trustee’s favor, this court
found that the plaintiffs failed to come “forward with a particularized
showing of need for specifically identified documents” and thus failed to
show “good cause.”
E. The court stated that it was unwilling to pierce the privilege to allow for a
“fishing expedition.”
F. Notably, this court distinguished the Kenny ruling, because the Kenny
court did not apply the good cause analysis (it’s not a requirement in the
9th Appellate Circuit).
G. The recommended practice points from the previous slide remain
strongly recommended.
www.nicsa.org
Digital Communications and Boards
A. Board fiduciary duties and record keeping
B. Duty to preserve and discovery issues
 Forward versus backward looking requests
 Special considerations relating to Board portals and electronic board books
o Duty to preserve – does it apply?
o How safe are board portal sites?
o Note taking features, tracking of use, messengering features . . . and the
risks they may present.
www.nicsa.org
Digital Communications and Boards
C. Email correspondence
 Importance of separate email accounts for board members
 What not to say in an email
D. Telephonic communication
 Includes text messaging
 Consider special application for messengering
 Voicemail technology
www.nicsa.org
Protecting Confidential Information
from Cybersecurity Breaches
A. Electronic board book provider
 Security assessment
 Ask about cybersecurity program and procedures
 Under what circumstances would you be notified of a breach?
 What is considered to be a breach?
B. Company proprietary information and hacking
 Assessment of software tools
 Testing
 Is deleted information really deleted?
 Metadata, document drafts
 Who has access to your data at a third-party service provider?
www.nicsa.org
Some Key Takeaways
• Apply best practices to all communications—email, texting, telephone
messages.
• Recommend separate communication streams between boards and
company management.
• Never intermingle personal or other company data with board data.
• Remember that for all practical purposes nothing is ever truly deleted.
• Write every communication as if it will appear on the front page of the
WSJ.
• Be mindful of who is on email distribution lists – cc’ing non-client/third
parties likely will operate as a waiver of the attorney-client privilege.
• Include review of electronic Board book providers cybersecurity programs
in cybersecurity oversight procedures.
• Test the security of information for the portals that you use.
www.nicsa.org
Stacy Louizos
Partner|InvestmentManagementGroup|DrinkerBiddle&ReathLLP
Stacy is a partner in the firm’s nationally ranked Investment Management Practice Group. Her national practice focuses on the
representation of registered investment companies and their independent directors and investment advisers. Over the past
nineteen years, she has advised clients on a broad range of matters relating to the operation of investment companies,
including the organization and offering of open-end and closed-end investment companies, mergers of individual mutual funds
and of fund complexes, and board governance, compliance and other regulatory matters under the federal securities laws. She
has served as fund counsel and/or counsel to the independent directors of fund complexes of all sizes, including a number of
large and well-known fund groups. Stacy regularly counsels and assists independent directors in their annual 15(c) contract
approval process and advises on topics such as board governance best practices, distribution, D&O insurance, and risk
management oversight. She has substantial experience relating to variable annuity insurance funds, funds of funds, manager of
managers structures, series trusts, alternative investment funds, master-feeder funds and money market funds. Stacy has been
consistently recommended in the area of Mutual/Registered Funds law in The Legal 500 United States. She received her J.D.
from Washington & Lee University and her B.A. from The University of North Carolina at Chapel Hill.
James G. Lundy
Partner|SEC&RegulatoryEnforcementGroup|DrinkerBiddle&ReathLLP
FormerlywithSECEnforcement&OCIE
Jim Lundy represents investment management firms, broker-dealers, hedge funds, public companies, audit firms, futures firms,
and individuals in investigations and enforcement actions instituted by the SEC, CFTC, FINRA, and other self-regulatory
organizations (SROs), as well as in high-risk regulatory examinations, securities and futures fraud investigations conducted by
the Department of Justice, and complex business litigation. With his collective experiences, including 12 years of SEC
experience and more than two years of senior in-house counsel experience, Jim has developed an in-depth working knowledge
of the various regulatory bodies with enforcement, examination, and regulatory oversight of the financial services
industry. Specifically, Jim spent nine successful years with the SEC’s Enforcement Division as a senior trial counsel and as a
branch chief, and then spent his final three years as a senior regulatory counsel in OCIE and assisted with operating the SEC’s examination program for the
Midwest region. Prior to joining Drinker Biddle, Jim served as an associate general counsel at a brokerage firm affiliated with a European-based global
bank, where he handled representations before the SEC, CFTC, FINRA, and other SROs. Jim co-maintains Drinker Biddle’s SECurities Law Perspectives Blog,
which provides reports, discussions, and analyses on noteworthy trends in the enforcement and regulatory activities of the SEC, CFTC, and other financial
regulatory agencies. He is a member of Drinker Biddle’s SEC & Regulatory Defense Team.
www.nicsa.org
Matthew Sullivan
SeniorSecurityEngineer| Workiva
Matthew Sullivan is a Senior Security Engineer at Workiva in Ames, Iowa. Matthew specializes in web application
security assessment and has authored several network security auditing tools which aid in the discovery of vulnerable
application deployments. He holds two patents in the highly competitive space of cloud encryption key management,
is the co-founder of the OWASP Ames chapter, and regularly presents to both technical and non-technical audiences
at various conferences and seminars.

More Related Content

What's hot

09.28.2017 Alternative Investment Strategies - Life Insurance Settlements
09.28.2017 Alternative Investment Strategies  - Life Insurance Settlements09.28.2017 Alternative Investment Strategies  - Life Insurance Settlements
09.28.2017 Alternative Investment Strategies - Life Insurance Settlements
Expert Webcast
 
Blaine Aikin: The Fiduciary Standard and Why It Matters
Blaine Aikin: The Fiduciary Standard and Why It MattersBlaine Aikin: The Fiduciary Standard and Why It Matters
Blaine Aikin: The Fiduciary Standard and Why It Matters
Dylan Pieri
 
International/Cross Border Legal Malpractice
International/Cross Border Legal MalpracticeInternational/Cross Border Legal Malpractice
International/Cross Border Legal Malpractice
Ethan Burger
 
Protecting Fiduciaries: ERISA Insurance, Bonding, and More
Protecting Fiduciaries: ERISA Insurance, Bonding, and MoreProtecting Fiduciaries: ERISA Insurance, Bonding, and More
Protecting Fiduciaries: ERISA Insurance, Bonding, and More
Carol Buckmann
 
Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...
Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...
Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...
AnnaSpektor
 
The Business of Medicine
The Business of MedicineThe Business of Medicine
The Business of Medicine
tldlaw
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
Logikcull.com
 
12.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 15
12.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 1512.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 15
12.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 15
Expert Webcast
 
Social media what lawyers should know
Social media   what lawyers should knowSocial media   what lawyers should know
Social media what lawyers should know
Clio - Cloud-Based Legal Technology
 
Legal Shield Review
Legal Shield ReviewLegal Shield Review
Legal Shield Review
legalfolks
 
Cyber Security Experts Forum
Cyber Security Experts ForumCyber Security Experts Forum
Cyber Security Experts Forum
Melissa Krasnow
 
Gary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management ConferenceGary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management Conference
LSG
 
05.31.2018 Resolving Shareholder and Investor Disputes
05.31.2018 Resolving Shareholder and Investor Disputes05.31.2018 Resolving Shareholder and Investor Disputes
05.31.2018 Resolving Shareholder and Investor Disputes
Expert Webcast
 
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-201520 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
Jeff Otteson
 
06.27.2018 Cannabis Industry Valuation Metrics and Transactions
06.27.2018 Cannabis Industry Valuation Metrics and Transactions06.27.2018 Cannabis Industry Valuation Metrics and Transactions
06.27.2018 Cannabis Industry Valuation Metrics and Transactions
Expert Webcast
 

What's hot (15)

09.28.2017 Alternative Investment Strategies - Life Insurance Settlements
09.28.2017 Alternative Investment Strategies  - Life Insurance Settlements09.28.2017 Alternative Investment Strategies  - Life Insurance Settlements
09.28.2017 Alternative Investment Strategies - Life Insurance Settlements
 
Blaine Aikin: The Fiduciary Standard and Why It Matters
Blaine Aikin: The Fiduciary Standard and Why It MattersBlaine Aikin: The Fiduciary Standard and Why It Matters
Blaine Aikin: The Fiduciary Standard and Why It Matters
 
International/Cross Border Legal Malpractice
International/Cross Border Legal MalpracticeInternational/Cross Border Legal Malpractice
International/Cross Border Legal Malpractice
 
Protecting Fiduciaries: ERISA Insurance, Bonding, and More
Protecting Fiduciaries: ERISA Insurance, Bonding, and MoreProtecting Fiduciaries: ERISA Insurance, Bonding, and More
Protecting Fiduciaries: ERISA Insurance, Bonding, and More
 
Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...
Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...
Expert Webcast Roundtable: Liquidity and Transition Strategies for Business O...
 
The Business of Medicine
The Business of MedicineThe Business of Medicine
The Business of Medicine
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
12.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 15
12.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 1512.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 15
12.19.2017 Multi-Jurisdictional Bankruptcies - Chapter 15
 
Social media what lawyers should know
Social media   what lawyers should knowSocial media   what lawyers should know
Social media what lawyers should know
 
Legal Shield Review
Legal Shield ReviewLegal Shield Review
Legal Shield Review
 
Cyber Security Experts Forum
Cyber Security Experts ForumCyber Security Experts Forum
Cyber Security Experts Forum
 
Gary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management ConferenceGary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management Conference
 
05.31.2018 Resolving Shareholder and Investor Disputes
05.31.2018 Resolving Shareholder and Investor Disputes05.31.2018 Resolving Shareholder and Investor Disputes
05.31.2018 Resolving Shareholder and Investor Disputes
 
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-201520 Questions to ask your Cyber Carrier - Wis Banker 12-2015
20 Questions to ask your Cyber Carrier - Wis Banker 12-2015
 
06.27.2018 Cannabis Industry Valuation Metrics and Transactions
06.27.2018 Cannabis Industry Valuation Metrics and Transactions06.27.2018 Cannabis Industry Valuation Metrics and Transactions
06.27.2018 Cannabis Industry Valuation Metrics and Transactions
 

Similar to Privilege and Proprietary Information in the Digital Age

BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101
BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101
BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101
Financial Poise
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
JTLeekley
 
Three Case Studies
Three Case StudiesThree Case Studies
Three Case Studies
Financial Poise
 
Three Case Studies (Series: Commercial Litigation Funding 101)
Three Case Studies (Series: Commercial Litigation Funding 101)   Three Case Studies (Series: Commercial Litigation Funding 101)
Three Case Studies (Series: Commercial Litigation Funding 101)
Financial Poise
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
HNI Risk Services
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
Sandra Fathi
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 
Investigation and discovery tools in law firms
Investigation and discovery tools in law firmsInvestigation and discovery tools in law firms
Investigation and discovery tools in law firms
Clio - Cloud-Based Legal Technology
 
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
Gary Allen
 
MWRM 2015 | Panel Discussion Presentation
MWRM 2015 | Panel Discussion PresentationMWRM 2015 | Panel Discussion Presentation
MWRM 2015 | Panel Discussion Presentation
NICSA
 
Corporate Formation: The Basics
Corporate Formation: The BasicsCorporate Formation: The Basics
Corporate Formation: The Basics
Mintz Levin
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
haynormania
 
Chief Litigation Summit 2009
Chief Litigation Summit 2009Chief Litigation Summit 2009
Chief Litigation Summit 2009
guested3c50
 
David Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscoveryDavid Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscovery
J. David Morris
 
The REALTOR Code of Ethics New Member Orientation Program
The REALTOR Code of EthicsNew Member Orientation ProgramThe REALTOR Code of EthicsNew Member Orientation Program
The REALTOR Code of Ethics New Member Orientation Program
Evangeline Yia
 
654L17_E
654L17_E654L17_E
654L17_E
Maria Romanova
 
Cyber liability insurance and your security program
Cyber liability insurance and your security programCyber liability insurance and your security program
Cyber liability insurance and your security program
Scott Takaoka
 
Loan Workout 101 for Financial Institutions
Loan Workout 101 for Financial InstitutionsLoan Workout 101 for Financial Institutions
Loan Workout 101 for Financial Institutions
Libby Bierman
 
Nigel Morris / QED Investors / Leading Innovation at Big Bank Scale
Nigel Morris / QED Investors / Leading Innovation at Big Bank ScaleNigel Morris / QED Investors / Leading Innovation at Big Bank Scale
Nigel Morris / QED Investors / Leading Innovation at Big Bank Scale
James by CrowdProcess
 
Asset Protection For Athletes
Asset Protection For AthletesAsset Protection For Athletes
Asset Protection For Athletes
GoReedo
 

Similar to Privilege and Proprietary Information in the Digital Age (20)

BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101
BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101
BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Three Case Studies
Three Case StudiesThree Case Studies
Three Case Studies
 
Three Case Studies (Series: Commercial Litigation Funding 101)
Three Case Studies (Series: Commercial Litigation Funding 101)   Three Case Studies (Series: Commercial Litigation Funding 101)
Three Case Studies (Series: Commercial Litigation Funding 101)
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Investigation and discovery tools in law firms
Investigation and discovery tools in law firmsInvestigation and discovery tools in law firms
Investigation and discovery tools in law firms
 
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
 
MWRM 2015 | Panel Discussion Presentation
MWRM 2015 | Panel Discussion PresentationMWRM 2015 | Panel Discussion Presentation
MWRM 2015 | Panel Discussion Presentation
 
Corporate Formation: The Basics
Corporate Formation: The BasicsCorporate Formation: The Basics
Corporate Formation: The Basics
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Chief Litigation Summit 2009
Chief Litigation Summit 2009Chief Litigation Summit 2009
Chief Litigation Summit 2009
 
David Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscoveryDavid Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscovery
 
The REALTOR Code of Ethics New Member Orientation Program
The REALTOR Code of EthicsNew Member Orientation ProgramThe REALTOR Code of EthicsNew Member Orientation Program
The REALTOR Code of Ethics New Member Orientation Program
 
654L17_E
654L17_E654L17_E
654L17_E
 
Cyber liability insurance and your security program
Cyber liability insurance and your security programCyber liability insurance and your security program
Cyber liability insurance and your security program
 
Loan Workout 101 for Financial Institutions
Loan Workout 101 for Financial InstitutionsLoan Workout 101 for Financial Institutions
Loan Workout 101 for Financial Institutions
 
Nigel Morris / QED Investors / Leading Innovation at Big Bank Scale
Nigel Morris / QED Investors / Leading Innovation at Big Bank ScaleNigel Morris / QED Investors / Leading Innovation at Big Bank Scale
Nigel Morris / QED Investors / Leading Innovation at Big Bank Scale
 
Asset Protection For Athletes
Asset Protection For AthletesAsset Protection For Athletes
Asset Protection For Athletes
 

More from NICSA

Understanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data QualityUnderstanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data Quality
NICSA
 
The Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: BlockchainThe Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: Blockchain
NICSA
 
Industry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing RoundtableIndustry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing Roundtable
NICSA
 
Understanding Regulation Best Interest
Understanding Regulation Best InterestUnderstanding Regulation Best Interest
Understanding Regulation Best Interest
NICSA
 
Trends in the Advisor Market
Trends in the Advisor Market Trends in the Advisor Market
Trends in the Advisor Market
NICSA
 
New Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance LandscapeNew Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance Landscape
NICSA
 
Navigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions LandscapeNavigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions Landscape
NICSA
 
Engaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse WorkforceEngaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse Workforce
NICSA
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
NICSA
 
Building Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with DataBuilding Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with Data
NICSA
 
FinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the HorizonFinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the Horizon
NICSA
 
Preparing for the Next-Gen Client Base
Preparing for the Next-Gen Client BasePreparing for the Next-Gen Client Base
Preparing for the Next-Gen Client Base
NICSA
 
Tax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting TrapsTax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting Traps
NICSA
 
Next Generation Proxy Voting
Next Generation Proxy VotingNext Generation Proxy Voting
Next Generation Proxy Voting
NICSA
 
Best Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance ProgramBest Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance Program
NICSA
 
AI Trends with Traction
AI Trends with TractionAI Trends with Traction
AI Trends with Traction
NICSA
 
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-DeliveryRule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
NICSA
 
Rethinking Product Development
Rethinking Product DevelopmentRethinking Product Development
Rethinking Product Development
NICSA
 
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the WorkplaceThe Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
NICSA
 
Data Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business StrategyData Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business Strategy
NICSA
 

More from NICSA (20)

Understanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data QualityUnderstanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data Quality
 
The Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: BlockchainThe Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: Blockchain
 
Industry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing RoundtableIndustry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing Roundtable
 
Understanding Regulation Best Interest
Understanding Regulation Best InterestUnderstanding Regulation Best Interest
Understanding Regulation Best Interest
 
Trends in the Advisor Market
Trends in the Advisor Market Trends in the Advisor Market
Trends in the Advisor Market
 
New Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance LandscapeNew Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance Landscape
 
Navigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions LandscapeNavigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions Landscape
 
Engaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse WorkforceEngaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse Workforce
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
 
Building Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with DataBuilding Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with Data
 
FinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the HorizonFinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the Horizon
 
Preparing for the Next-Gen Client Base
Preparing for the Next-Gen Client BasePreparing for the Next-Gen Client Base
Preparing for the Next-Gen Client Base
 
Tax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting TrapsTax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting Traps
 
Next Generation Proxy Voting
Next Generation Proxy VotingNext Generation Proxy Voting
Next Generation Proxy Voting
 
Best Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance ProgramBest Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance Program
 
AI Trends with Traction
AI Trends with TractionAI Trends with Traction
AI Trends with Traction
 
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-DeliveryRule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
 
Rethinking Product Development
Rethinking Product DevelopmentRethinking Product Development
Rethinking Product Development
 
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the WorkplaceThe Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
 
Data Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business StrategyData Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business Strategy
 

Recently uploaded

Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7 Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
shaankumar98663
 
美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】
美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】
美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】
ahmedendrise81
 
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike BaumannNavigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
mikebaumannfinancial
 
Poonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA Metrics
Poonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA MetricsPoonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA Metrics
Poonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA Metrics
shruti1menon2
 
Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]
Commonwealth
 
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
yeuwffu
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
brunasordi905
 
5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now
Daniel
 
Singapore Event 2024 State of Play Slides
Singapore Event 2024 State of Play SlidesSingapore Event 2024 State of Play Slides
Singapore Event 2024 State of Play Slides
International Federation of Accountants
 
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service ChennaiCall Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
namratasinha41
 
Application Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of MoneyApplication Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of Money
vineetabhati1
 
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory FrameworksKYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
Any kyc Account
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
asukqco
 
PM pre reads for the product manager framework
PM pre reads for the product manager frameworkPM pre reads for the product manager framework
PM pre reads for the product manager framework
KishoreKatta6
 
Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...
Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...
Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...
rosankumar564363
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
mukeshomran942
 
Accounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptxAccounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptx
TIZITAWMASRESHA
 
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdfGUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
ProexportColombia1
 
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docxTiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
lamluanvan.net Viết thuê luận văn
 

Recently uploaded (20)

Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)
 
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7 Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
 
美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】
美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】
美洲杯投注-美洲杯投注买球官方官网-美洲杯投注比赛投注官网|【​网址​🎉ac10.net🎉​】
 
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike BaumannNavigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
 
Poonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA Metrics
Poonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA MetricsPoonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA Metrics
Poonawalla Fincorp’s Strategy to Achieve Industry-Leading NPA Metrics
 
Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]
 
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
 
5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now
 
Singapore Event 2024 State of Play Slides
Singapore Event 2024 State of Play SlidesSingapore Event 2024 State of Play Slides
Singapore Event 2024 State of Play Slides
 
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service ChennaiCall Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
 
Application Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of MoneyApplication Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of Money
 
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory FrameworksKYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
 
PM pre reads for the product manager framework
PM pre reads for the product manager frameworkPM pre reads for the product manager framework
PM pre reads for the product manager framework
 
Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...
Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...
Call Girls in Mumbai (Maharashtra) call me [🔝9967824496🔝] Escort In Jaipur se...
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
 
Accounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptxAccounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptx
 
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdfGUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
GUIA_LEGAL_CHAPTER_2_FOREIGN EXCHANGE.pdf
 
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docxTiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
 

Privilege and Proprietary Information in the Digital Age

  • 1. www.nicsa.org Privilege and Proprietary Information in the Digital Age Are You As Protected As You Think?
  • 2. www.nicsa.org DISCUSSION TOPICS • What is attorney-client privileged – and what is not? • Kenny v. PIMCO Ruling • Chill v. Calamos Ruling • Digital communications and boards • Protecting confidential information from cybersecurity breaches • Some key takeaways
  • 3. www.nicsa.org What is Attorney-Client Privileged– And What is Not? A. What it is in context of board communications  Must include advice B. What/who is traditionally covered  Communications between a client and his or her attorney C. What may not be protected  Certain types of communication with independent trustee counsel  Communications with fund management, fund counsel D. Attorney work-product doctrine  Developed while representing a client and in anticipation of litigation E. Waiver of privilege  Be wary of inadvertently waiving F. How SEC staff views the exercise of privilege—then and now
  • 4. www.nicsa.org The Kenny v. PIMCO Ruling A. A “district court” ruling from the Western Dist. of Wash. in the 9th Appellate Circuit. B. The court ruled for plaintiff that the attorney client privilege did not apply to communications between the Independent Trustees of the Fund and Fund counsel. C. The court used the “fiduciary exception” to support its ruling and applied two theories: 1. The “Real Client” Theory 2. The “Duty to Inform” Theory D. DBR’s view – this appears to be a misapplication of these legal theories. Historically, these theories had been only been applied by courts to traditional trustee-beneficiary relationships and not in the investment company context.
  • 5. www.nicsa.org The Kenny v. PIMCO Ruling E. This type of ruling can serve as motivation to the plaintiff’s bar. Indeed, two recent motions from cases serve as examples: 1. Obeslo, et al. v. Great-West Life and Annuity Ins. Co., et al., pending in the Dist. of Colorado. 2. Chill v. Calamos Investment Trust, et al., filed in the Northern Dist. of Illinois. F. Practice Points: • Treat every communication as if it could potentially be discoverable. • Benefits of phone calls.
  • 6. www.nicsa.org The Chill v. Calamos Ruling A. The Trust and Trustees were not named as defendants in the underlying case pending in the Southern Dist. of N.Y. They reside in the Northern Dist. of Ill., where plaintiffs filed the motion. B. Like Kenny, plaintiffs sought the production of documents claimed to be privileged based on the “fiduciary exception.” C. Respondents did not dispute the application of this exception, but argued that the second element of the application of this exception needed to be applied. 1. Plaintiff has the burden to establish “good cause” to overcome the privilege. 2. Several factors establish good cause – including the most important – the necessity of the privileged information versus its availability from other sources.
  • 7. www.nicsa.org The Chill v. Calamos Ruling D. In ruling in the Trust’s and the Independent Trustee’s favor, this court found that the plaintiffs failed to come “forward with a particularized showing of need for specifically identified documents” and thus failed to show “good cause.” E. The court stated that it was unwilling to pierce the privilege to allow for a “fishing expedition.” F. Notably, this court distinguished the Kenny ruling, because the Kenny court did not apply the good cause analysis (it’s not a requirement in the 9th Appellate Circuit). G. The recommended practice points from the previous slide remain strongly recommended.
  • 8. www.nicsa.org Digital Communications and Boards A. Board fiduciary duties and record keeping B. Duty to preserve and discovery issues  Forward versus backward looking requests  Special considerations relating to Board portals and electronic board books o Duty to preserve – does it apply? o How safe are board portal sites? o Note taking features, tracking of use, messengering features . . . and the risks they may present.
  • 9. www.nicsa.org Digital Communications and Boards C. Email correspondence  Importance of separate email accounts for board members  What not to say in an email D. Telephonic communication  Includes text messaging  Consider special application for messengering  Voicemail technology
  • 10. www.nicsa.org Protecting Confidential Information from Cybersecurity Breaches A. Electronic board book provider  Security assessment  Ask about cybersecurity program and procedures  Under what circumstances would you be notified of a breach?  What is considered to be a breach? B. Company proprietary information and hacking  Assessment of software tools  Testing  Is deleted information really deleted?  Metadata, document drafts  Who has access to your data at a third-party service provider?
  • 11. www.nicsa.org Some Key Takeaways • Apply best practices to all communications—email, texting, telephone messages. • Recommend separate communication streams between boards and company management. • Never intermingle personal or other company data with board data. • Remember that for all practical purposes nothing is ever truly deleted. • Write every communication as if it will appear on the front page of the WSJ. • Be mindful of who is on email distribution lists – cc’ing non-client/third parties likely will operate as a waiver of the attorney-client privilege. • Include review of electronic Board book providers cybersecurity programs in cybersecurity oversight procedures. • Test the security of information for the portals that you use.
  • 12. www.nicsa.org Stacy Louizos Partner|InvestmentManagementGroup|DrinkerBiddle&ReathLLP Stacy is a partner in the firm’s nationally ranked Investment Management Practice Group. Her national practice focuses on the representation of registered investment companies and their independent directors and investment advisers. Over the past nineteen years, she has advised clients on a broad range of matters relating to the operation of investment companies, including the organization and offering of open-end and closed-end investment companies, mergers of individual mutual funds and of fund complexes, and board governance, compliance and other regulatory matters under the federal securities laws. She has served as fund counsel and/or counsel to the independent directors of fund complexes of all sizes, including a number of large and well-known fund groups. Stacy regularly counsels and assists independent directors in their annual 15(c) contract approval process and advises on topics such as board governance best practices, distribution, D&O insurance, and risk management oversight. She has substantial experience relating to variable annuity insurance funds, funds of funds, manager of managers structures, series trusts, alternative investment funds, master-feeder funds and money market funds. Stacy has been consistently recommended in the area of Mutual/Registered Funds law in The Legal 500 United States. She received her J.D. from Washington & Lee University and her B.A. from The University of North Carolina at Chapel Hill. James G. Lundy Partner|SEC&RegulatoryEnforcementGroup|DrinkerBiddle&ReathLLP FormerlywithSECEnforcement&OCIE Jim Lundy represents investment management firms, broker-dealers, hedge funds, public companies, audit firms, futures firms, and individuals in investigations and enforcement actions instituted by the SEC, CFTC, FINRA, and other self-regulatory organizations (SROs), as well as in high-risk regulatory examinations, securities and futures fraud investigations conducted by the Department of Justice, and complex business litigation. With his collective experiences, including 12 years of SEC experience and more than two years of senior in-house counsel experience, Jim has developed an in-depth working knowledge of the various regulatory bodies with enforcement, examination, and regulatory oversight of the financial services industry. Specifically, Jim spent nine successful years with the SEC’s Enforcement Division as a senior trial counsel and as a branch chief, and then spent his final three years as a senior regulatory counsel in OCIE and assisted with operating the SEC’s examination program for the Midwest region. Prior to joining Drinker Biddle, Jim served as an associate general counsel at a brokerage firm affiliated with a European-based global bank, where he handled representations before the SEC, CFTC, FINRA, and other SROs. Jim co-maintains Drinker Biddle’s SECurities Law Perspectives Blog, which provides reports, discussions, and analyses on noteworthy trends in the enforcement and regulatory activities of the SEC, CFTC, and other financial regulatory agencies. He is a member of Drinker Biddle’s SEC & Regulatory Defense Team.
  • 13. www.nicsa.org Matthew Sullivan SeniorSecurityEngineer| Workiva Matthew Sullivan is a Senior Security Engineer at Workiva in Ames, Iowa. Matthew specializes in web application security assessment and has authored several network security auditing tools which aid in the discovery of vulnerable application deployments. He holds two patents in the highly competitive space of cloud encryption key management, is the co-founder of the OWASP Ames chapter, and regularly presents to both technical and non-technical audiences at various conferences and seminars.