SlideShare a Scribd company logo
1 of 14
ESPIONAGEM E
MÍDIAS SOCIAIS:
ONDE ESTÃO SEUS DADOS AGORA ?
Moderated by:
Fernando M. Pinguelo, Esq.
Norris McLaughlin & Marcus, P.A.
Panelists:
Lara A. Ballard, Special Advisor for Privacy and Technology, United
States State Department
Edson Perin, Columnist, ELDORADO RADIO; author of IT For Business
Seth B. Kosto, Assistant U.S. Attorney, Department of Justice,
Computer Hacking and Intellectual Property Section
Email Questions
info@eLLblog.com
Tweet the Panel!
@ellblog_dot_com
Realidade de hoje
• Criminals are after corporate information, and increasingly, social
media sites are where they look to steal proprietary business data,
including personal data of employees and customers, proprietary
company data, and sensitive intellectual property – all found on
SOCIAL MEDIA.
• Data security breaches cost billions in fines, notification of data
subjects, governmental investigations and/or prosecution, loss of
business reputation, credibility, and loss of proprietary information,
trade secrets, and IP
• Will your company be the next headline? How do you respond?
Lara A. Ballard
Special Advisor, Privacy & Technology
• Office of Communications and Information Policy, Bureau of Economic, Energy and
Business Affairs, U.S. State Department
• Litigated claims in the Iran-U.S. Claims Tribunal and advised Bureau of Political-
Military Affairs on arms export control & various aspects of international criminal law.
• Defended the Department before the Equal Employment Opportunity Commission in
federal court.
• Most recently, served as the Department’s primary source of legal advice on a wide
variety of privacy and technology issues. Helped draft the Department’s guidance on
use of social media and provided legal advice to the administrators and designers of
the Sounding Board.
• Served as the Department’s primary representative to several interagency groups
dealing with issues related to privacy, surveillance, and global Internet freedom.
• Prior to her arrival at the State Department, she clerked for the late Hon. Fred I.
Parker, U.S. Court of Appeals for the Second Circuit. She is a graduate of Columbia
Law School and Georgetown University School of Foreign Service
• Served on active duty in the U.S. Army Air Defense Artillery Germany, leaving in 1995
with the rank of Captain.
Edson Perin
Columnist and Author
• Noted Columnist, ELDORADO RADIO
• Author of IT For Business
Seth B. Kosto
Assistant U.S. Attorney
Department of Justice, Computer Hacking and Intellectual Property Section
• Served as an Assistant United States Attorney in New Jersey since 2005.
Responsible for investigating and prosecuting computer crime and intellectual
property matters, including instances of hacking, computer intrusions, insider threats,
phishing and identity theft, and botnets.
• Part of prosecution team that indicted and convicted Albert Gonzalez, who received a
20-year prison sentence for conspiring with others to hack into Heartland Payment
Systems, 7-11, and other national corporations to steal credit and debit card data.
• Recipient of the prestigious Distinguished Service Award in October 2010.
• Recently secured the conviction of three men charged with using fraud techniques
and computer software to gain unauthorized access to millions of concert, sporting,
and event tickets.
• Other cyber matters include the conviction of an employee who deleted his former
employer’s computer network after being laid off; defendant who bribed customs
officials to further the importation of counterfeit luxury goods; and members of an
international bank fraud/identity theft ring that drained millions of dollars from victims’
home equity lines of credit.
• Graduate: Yale College and Boston College Law School.
Fernando M. Pinguelo, Esq.
• Trial Lawyer, licensed to practice law in the United States (New York,
Washington, D.C., and New Jersey)
• Partner at Norris McLaughlin & Marcus and Co-Chair of its Response to
Electronic Discovery and Information Group
• Experience in all facets of litigation (trial, mediation, and appellate) in both
federal and state courts. As a former prosecutor, tried numerous cases.
• Today, handles a broad spectrum of disputes including copyright
infringement, misappropriation of trade secrets, fraud, breach of non-
compete covenants, and business torts
• A leader in the emerging areas of electronic discovery and cyber law, works
with business owners and executives to develop strategies to manage
business and legal issues related to electronic documents and security
• Recently, the Fulbright Program, the U.S. government's international
exchange program, designated him a Fulbright Specialist for work in
eDiscovery; and he is guest lecturer at Mackenzie University and Fundação
Getulio Vargas
ESPIONAGEM E MÍDIAS SOCIAIS:
ONDE ESTÃO SEUS DADOS AGORA
?
PROGRAM OVERVIEW
• Discuss vulnerabilities and legal implications that employee social
media use creates for companies, making them more susceptible to
corporate espionage.
• General overview of social media, acceptable and necessary uses,
and the risks it creates.
• Addresses problems created by an employee’s natural inclination to
“bare all” on social media, and the negative consequences that
could have for the person’s employer.
• Use of social media to track a competitor: From acceptable DUE
DILIGENCE to CYBERCRIME
– Examples of acceptable DUE DILIGENCE
– Examples of unacceptable CYBERCRIME
ESPIONAGEM E MÍDIAS SOCIAIS:
ONDE ESTÃO SEUS DADOS AGORA
?
PROGRAM OVERVIEW (contínuo)
• Methods & Strategies businesses can develop to police employee
social media usage without sacrificing benefits and alienating
employees.
– Social Media Written Policies
– Monitoring and enforcement
• U.S. Federal Investigations/Prosecutions:
– Latest trends in cyber crimes (similarities & differences with past crimes)
– Trends in criminal enterprises’ use of social media information
– Government/business initiatives and programs to foster collaboration
and defenses against threats
• Trends toward greater data protection and encryption requirements
as global commerce follows advances in communications and social
media technology
• The role the media plays in breach notification
Corporate Espionage
Definition:
Clandestine techniques used to
steal valuable information from
businesses.
Perguntas?
OBRIGADO
• To receive a copy of
Social Media: A Corporate Spy’s Best
“Friend”: How employee social media
use may expose your company to cyber-
vulnerability, email:
info@NYLocalLaw.com
Informações de Contato
• Fernando M. Pinguelo, Esq.
– Norris McLaughlin & Marcus, P.A., 875 Third Avenue,
8th Floor, New York, NY 10022, Phone: 908-252-
4128, fmp@nmmlaw.com
• Lara A. Ballard, Special Advisor for Privacy and
Technology, United States State Department
• Edson Perin, Columnist, ELDORADO RADIO; author of
IT For Business
• Seth B. Kosto, Assistant U.S. Attorney, Department of
Justice, Computer Hacking and Intellectual Property
Section

More Related Content

What's hot

CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
Professionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS OntarioProfessionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS OntarioLou Milrad
 
Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breachRob Jackson
 
Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?IQPC Exchange
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual propertyCarlos Gonsalves
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft Shane Tilton
 

What's hot (20)

CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Review questions
Review questionsReview questions
Review questions
 
Professionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS OntarioProfessionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS Ontario
 
Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breach
 
Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?Can Information Management Law Keep Up With Technology?
Can Information Management Law Keep Up With Technology?
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
 

Similar to Corporate Espionage and Social Media: Where Are Your Data Now

Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technologyRakesh Mehta
 
Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Timothy Nolan
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docxvickeryr87
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationDr. Lydia Kostopoulos
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxzyleflorence
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxzyleflorence
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for LitigationMedpricer
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationsMedpricer
 

Similar to Corporate Espionage and Social Media: Where Are Your Data Now (20)

Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
E commerce
E commerce E commerce
E commerce
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technology
 
Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015
 
cyber crime
cyber crimecyber crime
cyber crime
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Rfc combined resume 6 22-2017
Rfc combined resume 6 22-2017Rfc combined resume 6 22-2017
Rfc combined resume 6 22-2017
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
 

More from FecomercioSP

irbem 2015 indicadores-sp_completa
irbem 2015  indicadores-sp_completairbem 2015  indicadores-sp_completa
irbem 2015 indicadores-sp_completaFecomercioSP
 
irbem 2015 indicadores-sp ppt
irbem 2015  indicadores-sp pptirbem 2015  indicadores-sp ppt
irbem 2015 indicadores-sp pptFecomercioSP
 
Apresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaApresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaFecomercioSP
 
Apresentação Renato Dolci
Apresentação Renato Dolci   Apresentação Renato Dolci
Apresentação Renato Dolci FecomercioSP
 
Dados e tendências sobre e-commerce
Dados e tendências sobre e-commerceDados e tendências sobre e-commerce
Dados e tendências sobre e-commerceFecomercioSP
 
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico FecomercioSP
 
A dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroA dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroFecomercioSP
 
Apresentação Anny Matumura - EY
Apresentação Anny Matumura - EYApresentação Anny Matumura - EY
Apresentação Anny Matumura - EYFecomercioSP
 
Apresentação Pesquisa Internet - Viviânne Martins
Apresentação Pesquisa Internet  - Viviânne MartinsApresentação Pesquisa Internet  - Viviânne Martins
Apresentação Pesquisa Internet - Viviânne MartinsFecomercioSP
 
Apresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoApresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoFecomercioSP
 
Apresentação Viviânne Martins
Apresentação Viviânne MartinsApresentação Viviânne Martins
Apresentação Viviânne MartinsFecomercioSP
 
Apresentação Antonio Borges
Apresentação Antonio BorgesApresentação Antonio Borges
Apresentação Antonio BorgesFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoReforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaReforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoReforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoFecomercioSP
 
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielReforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielFecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...FecomercioSP
 

More from FecomercioSP (20)

irbem 2015 indicadores-sp_completa
irbem 2015  indicadores-sp_completairbem 2015  indicadores-sp_completa
irbem 2015 indicadores-sp_completa
 
irbem 2015 indicadores-sp ppt
irbem 2015  indicadores-sp pptirbem 2015  indicadores-sp ppt
irbem 2015 indicadores-sp ppt
 
Apresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia EsmeraldaApresentação Criatividade Digital - Baia Esmeralda
Apresentação Criatividade Digital - Baia Esmeralda
 
Apresentação Renato Dolci
Apresentação Renato Dolci   Apresentação Renato Dolci
Apresentação Renato Dolci
 
Dados e tendências sobre e-commerce
Dados e tendências sobre e-commerceDados e tendências sobre e-commerce
Dados e tendências sobre e-commerce
 
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico Apresentação Pesquisa Conjuntural do Comércio Eletrônico
Apresentação Pesquisa Conjuntural do Comércio Eletrônico
 
A dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiroA dimensão do e-commerce no varejo brasileiro
A dimensão do e-commerce no varejo brasileiro
 
Apresentação Anny Matumura - EY
Apresentação Anny Matumura - EYApresentação Anny Matumura - EY
Apresentação Anny Matumura - EY
 
Apresentação Pesquisa Internet - Viviânne Martins
Apresentação Pesquisa Internet  - Viviânne MartinsApresentação Pesquisa Internet  - Viviânne Martins
Apresentação Pesquisa Internet - Viviânne Martins
 
Apresentação Pesquisa de Emprego
Apresentação Pesquisa de EmpregoApresentação Pesquisa de Emprego
Apresentação Pesquisa de Emprego
 
Apresentação Viviânne Martins
Apresentação Viviânne MartinsApresentação Viviânne Martins
Apresentação Viviânne Martins
 
Apresentação Antonio Borges
Apresentação Antonio BorgesApresentação Antonio Borges
Apresentação Antonio Borges
 
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica CaggianoReforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
Reforma Política - 12.09.2014 – Apresentação de Mônica Caggiano
 
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria LimaReforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
Reforma Política - 12.09.2014 – Apresentação de José Roberto Faria Lima
 
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio TorquatoReforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
Reforma Política - 12.09.2014 – Apresentação de Gaudêncio Torquato
 
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo MacielReforma Política - 12.09.2014 – Apresentação de Everardo Maciel
Reforma Política - 12.09.2014 – Apresentação de Everardo Maciel
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
Seminário Terceirização e o STF: o que esperar? - 01092014 – Apresentação de ...
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Corporate Espionage and Social Media: Where Are Your Data Now

  • 1. ESPIONAGEM E MÍDIAS SOCIAIS: ONDE ESTÃO SEUS DADOS AGORA ? Moderated by: Fernando M. Pinguelo, Esq. Norris McLaughlin & Marcus, P.A. Panelists: Lara A. Ballard, Special Advisor for Privacy and Technology, United States State Department Edson Perin, Columnist, ELDORADO RADIO; author of IT For Business Seth B. Kosto, Assistant U.S. Attorney, Department of Justice, Computer Hacking and Intellectual Property Section
  • 4. Realidade de hoje • Criminals are after corporate information, and increasingly, social media sites are where they look to steal proprietary business data, including personal data of employees and customers, proprietary company data, and sensitive intellectual property – all found on SOCIAL MEDIA. • Data security breaches cost billions in fines, notification of data subjects, governmental investigations and/or prosecution, loss of business reputation, credibility, and loss of proprietary information, trade secrets, and IP • Will your company be the next headline? How do you respond?
  • 5. Lara A. Ballard Special Advisor, Privacy & Technology • Office of Communications and Information Policy, Bureau of Economic, Energy and Business Affairs, U.S. State Department • Litigated claims in the Iran-U.S. Claims Tribunal and advised Bureau of Political- Military Affairs on arms export control & various aspects of international criminal law. • Defended the Department before the Equal Employment Opportunity Commission in federal court. • Most recently, served as the Department’s primary source of legal advice on a wide variety of privacy and technology issues. Helped draft the Department’s guidance on use of social media and provided legal advice to the administrators and designers of the Sounding Board. • Served as the Department’s primary representative to several interagency groups dealing with issues related to privacy, surveillance, and global Internet freedom. • Prior to her arrival at the State Department, she clerked for the late Hon. Fred I. Parker, U.S. Court of Appeals for the Second Circuit. She is a graduate of Columbia Law School and Georgetown University School of Foreign Service • Served on active duty in the U.S. Army Air Defense Artillery Germany, leaving in 1995 with the rank of Captain.
  • 6. Edson Perin Columnist and Author • Noted Columnist, ELDORADO RADIO • Author of IT For Business
  • 7. Seth B. Kosto Assistant U.S. Attorney Department of Justice, Computer Hacking and Intellectual Property Section • Served as an Assistant United States Attorney in New Jersey since 2005. Responsible for investigating and prosecuting computer crime and intellectual property matters, including instances of hacking, computer intrusions, insider threats, phishing and identity theft, and botnets. • Part of prosecution team that indicted and convicted Albert Gonzalez, who received a 20-year prison sentence for conspiring with others to hack into Heartland Payment Systems, 7-11, and other national corporations to steal credit and debit card data. • Recipient of the prestigious Distinguished Service Award in October 2010. • Recently secured the conviction of three men charged with using fraud techniques and computer software to gain unauthorized access to millions of concert, sporting, and event tickets. • Other cyber matters include the conviction of an employee who deleted his former employer’s computer network after being laid off; defendant who bribed customs officials to further the importation of counterfeit luxury goods; and members of an international bank fraud/identity theft ring that drained millions of dollars from victims’ home equity lines of credit. • Graduate: Yale College and Boston College Law School.
  • 8. Fernando M. Pinguelo, Esq. • Trial Lawyer, licensed to practice law in the United States (New York, Washington, D.C., and New Jersey) • Partner at Norris McLaughlin & Marcus and Co-Chair of its Response to Electronic Discovery and Information Group • Experience in all facets of litigation (trial, mediation, and appellate) in both federal and state courts. As a former prosecutor, tried numerous cases. • Today, handles a broad spectrum of disputes including copyright infringement, misappropriation of trade secrets, fraud, breach of non- compete covenants, and business torts • A leader in the emerging areas of electronic discovery and cyber law, works with business owners and executives to develop strategies to manage business and legal issues related to electronic documents and security • Recently, the Fulbright Program, the U.S. government's international exchange program, designated him a Fulbright Specialist for work in eDiscovery; and he is guest lecturer at Mackenzie University and Fundação Getulio Vargas
  • 9. ESPIONAGEM E MÍDIAS SOCIAIS: ONDE ESTÃO SEUS DADOS AGORA ? PROGRAM OVERVIEW • Discuss vulnerabilities and legal implications that employee social media use creates for companies, making them more susceptible to corporate espionage. • General overview of social media, acceptable and necessary uses, and the risks it creates. • Addresses problems created by an employee’s natural inclination to “bare all” on social media, and the negative consequences that could have for the person’s employer. • Use of social media to track a competitor: From acceptable DUE DILIGENCE to CYBERCRIME – Examples of acceptable DUE DILIGENCE – Examples of unacceptable CYBERCRIME
  • 10. ESPIONAGEM E MÍDIAS SOCIAIS: ONDE ESTÃO SEUS DADOS AGORA ? PROGRAM OVERVIEW (contínuo) • Methods & Strategies businesses can develop to police employee social media usage without sacrificing benefits and alienating employees. – Social Media Written Policies – Monitoring and enforcement • U.S. Federal Investigations/Prosecutions: – Latest trends in cyber crimes (similarities & differences with past crimes) – Trends in criminal enterprises’ use of social media information – Government/business initiatives and programs to foster collaboration and defenses against threats • Trends toward greater data protection and encryption requirements as global commerce follows advances in communications and social media technology • The role the media plays in breach notification
  • 11. Corporate Espionage Definition: Clandestine techniques used to steal valuable information from businesses.
  • 13. OBRIGADO • To receive a copy of Social Media: A Corporate Spy’s Best “Friend”: How employee social media use may expose your company to cyber- vulnerability, email: info@NYLocalLaw.com
  • 14. Informações de Contato • Fernando M. Pinguelo, Esq. – Norris McLaughlin & Marcus, P.A., 875 Third Avenue, 8th Floor, New York, NY 10022, Phone: 908-252- 4128, fmp@nmmlaw.com • Lara A. Ballard, Special Advisor for Privacy and Technology, United States State Department • Edson Perin, Columnist, ELDORADO RADIO; author of IT For Business • Seth B. Kosto, Assistant U.S. Attorney, Department of Justice, Computer Hacking and Intellectual Property Section