SlideShare una empresa de Scribd logo
1 de 51
2
Practical and entertaining education for
attorneys, accountants, business owners and
executives, and investors.
Disclaimer
The material in this webinar is for informational purposes only. It should not be considered
legal, financial or other professional advice. You should consult with an attorney or other
appropriate professional to determine what may be best for your individual needs. While
Financial Poise™ takes reasonable steps to ensure that information it publishes is accurate,
Financial Poise™ makes no guaranty in this regard.
3
4
Thank You To Our Sponsors
Meet the Faculty
MODERATOR:
Kathryn Nadro - Sugar, Felsenthal, Grais & Helsinger LLP
PANELISTS:
Joseph P. Facciponti - Davis Wright Tremaine
Cassandra M. Porter, Esq., - Zuora
Alison Schaffer - Jump Trading Group
5
About This Webinar-
Introduction to US Privacy and Data Security:
Regulations and Requirements
The United States has no federal data security or privacy law covering all businesses or
all U.S. citizens. Instead, federal agencies and individual states have created their own
patchwork of laws and regulations which must be evaluated for their application to a
business.
This webinar will help you navigate the overlapping and sometimes confusing system of
laws and regulations which may impact your business, ranging from emerging state-
level privacy legislation to the numerous data breach notification statutes to
cybersecurity regulations with extraterritorial effect.
6
About This Series
Cyber Security & Data Privacy 2022
Cybersecurity and data privacy are critical topics of concern for every business in today’s
environment. Data breaches are a threat to every business and can cause both direct losses
from business interruption and loss of data to indirect losses from unwanted publicity and
damage to your business’s reputation. Compliance with a patchwork of potentially applicable
state and federal laws and regulations may cost your business in terms of money and time.
This series discusses the various laws and regulations that affect businesses in the United
States and in Europe, as well as the best practices to use in creating an information security
program and preparing for and responding to data breaches.
Each Financial Poise Webinar is delivered in Plain English, understandable to investors, business owners, and
executives without much background in these areas, yet is of primary value to attorneys, accountants, and other
seasoned professionals. Each episode brings you into engaging, sometimes humorous, conversations designed to
entertain as it teaches. Each episode in the series is designed to be viewed independently of the other episodes so that
participants will enhance their knowledge of this area whether they attend one, some, or all episodes.
7
Episodes in this Series
#1 Introduction to US Privacy and Data Security: Regulations and Requirements
Premiere date: 08/03/22
#2: Introduction to EU General Data Protection Regulation: Planning, Implementation, and
Compliance
Premiere date: 9/07/22
#3: How to Build and Implement your Company's Information Security Program
Premiere date: 10/12/22
#4: Data Breach Response: Before and After the Breach
Premiere date: 11/09/22
8
Episode #1: Introduction to US Privacy and Data
Security: Regulations and Requirements
9
Data Security and Privacy in the News
• July 4, 2021 weekend: massive data breach, including over 700 million records
exposed in LinkedIn breach (https://www.cbs17.com/news/investigators/linkedin-
data-breach-exposes-info-of-700m-users/)
• Pegasus Project confirms spyware used to track journalists in 20 countries
(https://www.cpomagazine.com/cyber-security/data-leak-reveals-pegasus-spyware-
found-in-use-unlawfully-in-20-countries-with-capability-to-break-current-iphone-
security/)
• July 23, 2021: priest resigns after media obtain location data showing use of Grindr
through “commercially available app signal data” (https://time.com/6083323/bishop-
pillar-grindr-data/)
What is Data Security?
• Confidentiality, availability, and integrity of data
• All the practices and processes used to protect data from being used or accessed by
unauthorized individuals
• How a company safeguards the data it collects and uses from threats
What is Data Privacy?
• The appropriate use of data, including the use of data according to agreed purposes
• How a company uses the data that it has collected
What is Personal Information?
• “personally identifiable information” sometimes called “PII”
✓ Can be linked to a specific individual
✓ Name, email, full postal address, birth date, SSN, driver’s license number, account
numbers
• “non-personally identifiable information”
✓ Cannot by itself be used to identify a specific individual
✓ Aggregate data, zip code, area code, city, state, gender, age
What is Personal Information? (cont’d)
• Gray area – “anonymized” data
✓ Non-PII that, when linked with other data, can effectively identify a person
✓ Geolocation data
✓ Site history and viewing patterns from IP address
Why Do We Need to Protect It?
• Data is a corporate asset
• Corporate data is at a higher risk of theft or misuse than ever before
• Consumers now expect companies to take initiative to protect both security and
privacy – in the past several years, these topics have been increasingly discussed in
public, particularly in light of social media uses of information and highly publicized
data breaches
What Must Companies Do to Protect It?
• Compliance with state, local, federal laws and regulations
✓ Patchwork of laws developed by sector
✓ Contrast to Europe, which has a centralized, uniform law
✓ Makes it difficult to comply when multiple, possibly inconsistent laws apply
• Contracts with third parties
What Must Companies Do to Protect It? (cont’d)
• Privacy policies for website users
✓ Don’t need one if: website is static, is purely B2B, and collects no PII from
consumers
✓ Should cover:
o Actual practices for PII and information that reasonably could be associated
with a person or device, regarding collection, storage, use, and sharing of info
✓ Be aware of: financial information, medical information, children’s information
• Privacy audits:
✓ Run them periodically to review and assess policies and practice for data
What Must Companies Do to Protect It? (cont’d)
• Your company may have more PII than you are aware of
✓ For example, if your company gives out commercial loans, it must comply with
GLB
✓ BUT: if you also take guarantees, then you have personal information such as
account information, possibly life insurance information, mortgage information, etc.
that must be secured
✓ Have to think more creatively about what types of information you might be
collecting
o Credit card payments – have to secure that information
California Consumer Privacy Act
• Effective January 1, 2020, companies will have to observe restrictions on data
monetization business models, accommodate rights to access, deletion, and porting of
personal data, and update privacy policies
• “Consumers” (defined as natural persons who are California residents) have the right
to know what personal information a business has collected about them and what it is
used for, the right to opt out of allowing a business to sell their personal information to
third parties, the right to have a business delete personal information, and the right to
receive equal servicing and pricing from a business even if they exercise their privacy
rights under the Act.
California Consumer Privacy Act (cont’d)
• “personal information” is “any information that…relates to…a particular consumer or
household”
✓ Information about a household may include information like utility bills or pricing
• Companies must comply if they receive personal data from California residents and
they or their parent company or a subsidiary exceed (a) annual gross revenues of $25
million, (b) obtains personal information of 50,000 or more California residents,
households or devices annually, or (c) 50 percent or more annual revenue from selling
California residents’ personal information.
California Consumer Privacy Act (cont’d)
• The Act provides a private right of action that allows consumers to seek, either
individually or as a class, statutory or actual damages and injunctive relief, if their
sensitive personal information is subject to unauthorized access and exfiltration, theft
or disclosure as a result of a business’s failure to implement and maintain reasonable
security measures
✓ Statutory damages can be between $100 and $750 per California resident per
incident, or actual damages, whichever is greater
Other State Privacy Laws
• California Privacy Rights Act (CPRA): operative Jan. 1, 2023 and amends the CCPA
• Virginia Consumer Data Protection Act: operative Jan. 1, 2023
• Colorado Privacy Act: operative July 1, 2023
• All statewide privacy laws currently apply to businesses which process data from over a
certain threshold of consumers (usually 50,000 or 100,000)
• All have different exemptions, definitions of “processor” or “controller,” different consumer
rights and protections, and different penalties for noncompliance
New York Stop Hacks and Improve Electronic Data
Security (“SHIELD”) Act
• Expands NY breach notification law and imposes data security program requirements on
businesses that possess the private information of New York State residents
• Applies regardless of whether the businesses have any physical presence in New
York State
• Program requirements include administrative, technical, and physical safeguards for
detecting and responding to intrusions and maintaining security of information
• Businesses subject to and in compliance with Gramm-Leach-Bliley, HIPAA, or the NY
Dept. of Financial Services Cybersecurity Requirements are exempted from this
requirement under the SHIELD Act
New York Stop Hacks and Improve Electronic Data
Security (“SHIELD”) Act (cont’d)
• Limited reprieve for “small businesses” with fewer than fifty employees, less than $3
million in gross revenues in the last three fiscal years, or less than $5 million in year-end
total assets
• Expands the definition of “private information” subject to NY data breach notification
law
• NY Attorney General can pursue civil penalties, but there is no private right of action
Massachusetts Standards – 201 C.M.R. 17
• 2010 law – most protective privacy and security law in the US at that time
• Requires every business that licenses or owns personal information of Massachusetts
residents to comply with the minimum security standards set forth in the regulation
and implement a written information security program (“WISP”) with appropriate
administrative, technical, and physical safeguards
Massachusetts Standards – 201 C.M.R. 17 (cont’d)
✓ Standards must be consistent with those set forth in state and federal regulations
to which a business is subject, including data breach notification laws, HIPAA, and
the Gramm-Leach-Bliley Act
• Require, when technically feasible, the encryption of personal information stored on
portable devices and personal information transmitted across public networks or
wirelessly
• “personal information” – “a Massachusetts resident’s first name and last name or first
initial and last name in combination with any one or more of the following data elements
that relate to such resident: (a) Social Security number; (b) driver’s license number or
state-issued identification card number; or (c) financial account number, or credit or debit
card number, with or without any required security code, access code, personal
identification number or password, that would permit access to a resident’s financial
account.”
New York Cybersecurity Regulation, 23 NYCRR Part
500
• Regulation from the New York Department of Financial Services, which went into effect
March 2017 and was fully effective March 1, 2019
• Mandates minimum cybersecurity standards for any banking, insurance and brokerage
firm using a license to operate in New York
• Covered entities had to certify compliance June 1, 2020
GDPR and the Shrems II Decision
• 2020 decision from the Court of Justice of the European Union
• Invalidated the US-EU Privacy Shield
• Closes off key mechanisms for transferring personal data from the EU to the US
• Shrems I invalidated European Commission adequacy decisions with respect to
EU-U.S. Safe Harbor
GDPR and the Shrems II Decision (cont’d)
• CJEU was concerned with US government access to personal data for national security
purposes and the rights of EU citizens in the US to judicial review and redress
• CJEU found the U.S. was not according EU personal data the protection and rights of
redress available in the EU
• In June 2021, the European Commission adopted two sets of modernized Standard
Contractual Clauses to allow for international data flows consistent with the decision
EU-US Data Transfers Currently
The EU and US are still in talks to come up with a replacement for Privacy Shield
• On March 25, 2022, the European Commission President announced a new agreement
with the US to expand Privacy Shield and permit EU-US data flows again
• Companies can still use Standard Contractual Clauses and Binding Corporate Rules to
permit data flows
• This decision will also likely face a challenge – a Schrems III scenario
Gramm-Leach-Bliley
• Overseen by the FTC
✓ Requires financial institutions (companies that offer consumers financial products
or services like loans, financial or investment advice, or insurance) – to explain
their information-sharing practices to their customers and to safeguard sensitive
data through use of privacy policies and prohibitions against disclosing non-public
personal information to third parties
✓ Also requires financial institutions to protect the security and confidentiality of their
customers’ non-public personal information
HIPAA
• The Health Insurance Portability and Accountability Act (HIPAA) regulates medical
information.
• HIPAA Privacy Rule:
✓ Requires appropriate safeguards to protect the privacy of “protected health
information” (PHI).
✓ Sets limits and conditions on the uses and disclosures that may be made of such
information without patient authorization.
• Gives patients rights over their health information, including rights to examine and
obtain a copy of their health records, and to request corrections.
HIPAA (cont’d)
• HIPAA Security Rule requires appropriate administrative, physical and technical
safeguards to ensure the confidentiality, integrity, and security of “electronic protected
health information” (ePHI).
• Privacy Rule and Security Rule are primarily enforced by the U.S. Department of
Health & Human Services Office for Civil Rights.
FTC Act
• FTC is the main federal regulator in charge of policing privacy and cybersecurity
practices among U.S. companies generally.
• FTC derives its power from Section 5(a) of the FTC Act and pursues cases against
companies for “unfair” or “deceptive” practices, where the company allegedly had
inadequate cybersecurity practices, or overstated how comprehensive their privacy
and cybersecurity practices were.
• Consent decrees and settlements often result in monetary damages, and
requirements that companies establish rigorous privacy and data security practices
(which would be overseen by the FTC).
Other Applicable Federal Laws
• CAN-SPAM Act: regulates emails that companies send for commercial purposes and
requires opt-out ability for consumers.
• Telephone Consumer Protection Act (TCPA): restricts the making of telemarketing calls
and creates a private right of action for consumers.
• Fair Credit Reporting Act (FCRA): regulates consumer reporting agencies and the use of
such information by private parties.
• Children’s Online Privacy Protection Act (COPPA): regulates the collection and use of
data belonging to children under 13
State Level Data Breach Laws
• All 50 states, the District of Columbia, and some U.S. territories have their own data
breach notification laws
• These laws generally require notification of affected individuals and regulators when a
company suffers a breach of the security of an individual’s personally identifiable
information (PII).
• If a company suffers a data breach involving the PII of customers or employees who
are resident in multiple states, it will need to comply with each applicable state’s laws.
What is a Data Breach? (That May Trigger State
Notification Laws)
• Unauthorized acquisition of PII that compromises the security, confidentiality or
integrity of PII…
✓ That results or could result in identity theft or fraud (OH)
✓ Unless PII is not used or subject to further unauthorized disclosure (NE)
✓ Unless no misuse of PII has occurred or is not reasonably likely to occur (NJ)
✓ Unless no reasonable likelihood of harm to consumer whose PII was acquired has
resulted or will result (CT)
What is a Data Breach? (That May Trigger State
Notification Laws) (cont’d)
✓ That has caused or is likely to cause loss or injury to resident (MI)
✓ That causes or is reasonably likely to cause substantial economic loss to the
individual (AZ)
✓ Unless no reasonable likelihood of financial harm to consumer whose PII was
acquired has resulted or will result (IA)
Why We Should be Careful with the Word “Breach”
• Using “breach” to describe a data-privacy related incident assumes the incident meets
the definition of a security breach which triggers various notification requirements
• Be careful to notify the correct person/entity
• An “incident” does not always rise to the level of “breach” (i.e., encryption safe harbor)
• “Incident” is better received by the public than “breach”
Standing for Data Breach Purposes
• The Supreme Court in Ramirez v. TransUnion, 136 S. Ct. 1540 ruled in June 2021 that
victims of a data breach may not have Article III standing unless they suffered “concrete”
harm from the breach
• Mere violations of a statute, even a statute which provides a private right of action, may
not be sufficient for Article III standing in federal litigation
• The Second Circuit recently ruled in Stevens v. Carlos Lopez that the increased risk of
identity theft alone may not establish standing either but will depend on the facts of each
particular case, and held that there was no circuit split (foreclosing a ripe opportunity for
Supreme Court review of the issue)
Breach Notification Laws
• State laws differ with respect to:
✓ Deadline for notifying (14, 30, 45 days; reasonable time)
✓ Notification to Attorney General
✓ Notification to other State agencies
✓ Including Attorney General contact information
✓ Substitute notice (email, website, media)
✓ Specific facts of incident and type of PII compromised
✓ Maintaining records of incident (for 3-5 years)
✓ Countries also differ with notice requirements
American Data Privacy and Protection Act
• American Data Privacy and Protection Act – introduced in both the House and the Senate
in June 2022 with bipartisan support
• Provisions for: enhanced children’s protections, limits on targeted advertising, preemption
over facets of state laws, and a limited private right of action
• Also mandates a chief privacy officer position for organizations and imposes data
minimization requirements
• FTC would be charged with enforcement of its provisions
About the Faculty
43
About The Faculty
Kathryn Nadro - knadro@sfgh.com
Kathryn (“Katie”) Nadro leads Sugar Felsenthal Grais & Helsinger’s Data Security and Privacy practice.
Katie advises clients on a diverse array of business matters, including data security and privacy
compliance, commercial and business disputes, and employment issues. Katie works with individuals
and businesses of all sizes to craft successful resolutions tailored to each individual matter.
Katie is a Certified Information Privacy Professional (CIPP/US) and counsels clients on a variety of data
security and privacy issues, including breach response, policy drafting, program management, data
collection, vendor management, and compliance with ever-changing state, federal, and international
privacy law. Katie also has broad litigation experience representing companies and individuals in
contract, non-compete, discrimination, harassment, fiduciary duty, and trade secret litigation in state
and federal court. With a background as both in-house and outside counsel, Katie understands that
business objectives, time, and resources play an important role in reaching a favorable outcome for
each client.
44
About The Faculty
Joseph P. Facciponti - josephfacciponti@dwt.com
Joseph is a former federal prosecutor and in-house law department leader whose practice
focuses on white-collar defense, internal investigations, cybersecurity, and data privacy. For
nearly nine years, Joseph served as a prosecutor at the U.S. Attorney's Office for the
Southern District of New York, where he handled complex and high-profile cases involving
computer hacking, fraud, money laundering, and intellectual property theft. In 2010, he
received an FBI Director's Award for outstanding cyber investigation, based on his work in
investigating and disrupting a major international computer hacking ring that targeted financial
institutions.
45
About The Faculty
Cassandra Porter - caporter@zuora.com
Cassandra M. Porter is the Americas/APAC data privacy lead attorney for a Fortune 100 Tech company working to
transform clients’ businesses, operations and technology models for the digital era. She counsels internal clients on
privacy-related matters such as data collection practices, online advertising, mobile commerce, along with the
development and acquisition of new technology, data incidents and management. Cassandra is a member of the
inaugural class of Privacy Law Specialists, a new specialty recognized by the American Bar Association, and a Fellow of
Information Privacy by the International Association of Privacy Professionals (IAPP). Her IAPP credentials as a Certified
Information Privacy Professional and Certified Information Privacy Manager designate her as thought leader in the
field. She is a former co-chair of the IAPP’s New Jersey Chapter and member of the Bankruptcy Lawyers Advisory
Committee for the District of New Jersey. As a member of the United States Trustee’s Consumer Privacy Ombudsman
(CPO) panel, she served as the CPO in the Golfsmith International chapter 11 cases. Previously she was counsel at
Lowenstein Sandler LLP where, in addition to assisting clients with data privacy-related issues, she also regularly
represented debtors in possession and creditors in chapter 11 matters along with indigents in chapter 7 proceedings in
association with the Volunteer Lawyers for Justice. Prior to joining Lowenstein, she clerked for the Honorable Cecelia
Morris, United States Bankruptcy Judge for the Southern District of New York and was the Assistant Managing Attorney
at Kaye Scholer LLP.
46
About The Faculty
Alison Schaffer - aschaffer@jumptrading.com
Alison Schaffer Bloom is Legal and Regulatory Counsel at the Jump Trading Group in
Chicago. Alison works extensively in the areas of trading, technology, human resources,
venture capital, and data protection and privacy. Specifically, Alison leads data protection and
privacy application for all of the Jump Trading Group’s business lines globally. Alison
graduated from Northwestern University with Honors in Legal Studies and Communication
Studies and a Certificate in Service Learning and attained a Masters in Education while a
Teach For America corps member in New York. Alison obtained her Juris Doctor from
Chicago-Kent College of Law, where she was an avid member of the Trial Team. She is a
member of the International Association of Privacy Professionals and holds the Certified
Information Privacy Professional/Europe (CIPP/E), a preeminent certification for advanced
concentration in European data protection laws, standards and practices.
47
Questions or Comments?
If you have any questions about this webinar that you did not get to ask during the live
premiere, or if you are watching this webinar On Demand, please do not hesitate to email us
at info@financialpoise.com with any questions or comments you may have. Please include
the name of the webinar in your email and we will do our best to provide a timely response.
IMPORTANT NOTE: The material in this presentation is for general educational purposes
only. It has been prepared primarily for attorneys and accountants for use in the pursuit of
their continuing legal education and continuing professional education.
48
49
About Financial Poise
51
DailyDAC LLC, d/b/a Financial Poise™ provides
continuing education to attorneys, accountants,
business owners and executives, and investors. It’s
websites, webinars, and books provide Plain English,
entertaining, explanations about legal, financial, and
other subjects of interest to these audiences.
Visit us at www.financialpoise.com
Our free weekly newsletter, Financial Poise
Weekly, updates you on new articles published
on our website and Upcoming Webinars you
may be interested in.
To join our email list, please visit:
https://www.financialpoise.com/subscribe/

Más contenido relacionado

Similar a Introduction to US Privacy and Data Security: Regulations and Requirements

Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to KnowThe Capital Network
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008guestabd20
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Financial Poise
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)guest95afa8
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From PplSue Tjernlund
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Pplsusantj3
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 

Similar a Introduction to US Privacy and Data Security: Regulations and Requirements (20)

Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
ClientAdvisoryNote - Obama's Privacy Action Plan
ClientAdvisoryNote - Obama's Privacy Action PlanClientAdvisoryNote - Obama's Privacy Action Plan
ClientAdvisoryNote - Obama's Privacy Action Plan
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Bootcamp)
 
Privacy Needs to be Personal
Privacy Needs to be PersonalPrivacy Needs to be Personal
Privacy Needs to be Personal
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 

Más de Financial Poise

IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileIP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileFinancial Poise
 
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics  IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics Financial Poise
 
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingTHE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingFinancial Poise
 
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!Financial Poise
 
PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style Financial Poise
 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...Financial Poise
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...Financial Poise
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 Financial Poise
 
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...Financial Poise
 
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas Financial Poise
 
BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business Financial Poise
 
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101Financial Poise
 
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts Financial Poise
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...Financial Poise
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...Financial Poise
 
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...Financial Poise
 
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsM&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsFinancial Poise
 
M&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessM&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessFinancial Poise
 
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveCROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveFinancial Poise
 
CROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for IntermediariesCROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for IntermediariesFinancial Poise
 

Más de Financial Poise (20)

IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileIP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
 
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics  IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
 
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingTHE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
 
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
 
PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style
 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
 
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
 
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
 
BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business
 
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
 
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
 
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
 
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsM&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
 
M&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessM&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A Process
 
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveCROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
 
CROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for IntermediariesCROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
 

Último

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Introduction to US Privacy and Data Security: Regulations and Requirements

  • 1.
  • 2. 2 Practical and entertaining education for attorneys, accountants, business owners and executives, and investors.
  • 3. Disclaimer The material in this webinar is for informational purposes only. It should not be considered legal, financial or other professional advice. You should consult with an attorney or other appropriate professional to determine what may be best for your individual needs. While Financial Poise™ takes reasonable steps to ensure that information it publishes is accurate, Financial Poise™ makes no guaranty in this regard. 3
  • 4. 4 Thank You To Our Sponsors
  • 5. Meet the Faculty MODERATOR: Kathryn Nadro - Sugar, Felsenthal, Grais & Helsinger LLP PANELISTS: Joseph P. Facciponti - Davis Wright Tremaine Cassandra M. Porter, Esq., - Zuora Alison Schaffer - Jump Trading Group 5
  • 6. About This Webinar- Introduction to US Privacy and Data Security: Regulations and Requirements The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business. This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state- level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect. 6
  • 7. About This Series Cyber Security & Data Privacy 2022 Cybersecurity and data privacy are critical topics of concern for every business in today’s environment. Data breaches are a threat to every business and can cause both direct losses from business interruption and loss of data to indirect losses from unwanted publicity and damage to your business’s reputation. Compliance with a patchwork of potentially applicable state and federal laws and regulations may cost your business in terms of money and time. This series discusses the various laws and regulations that affect businesses in the United States and in Europe, as well as the best practices to use in creating an information security program and preparing for and responding to data breaches. Each Financial Poise Webinar is delivered in Plain English, understandable to investors, business owners, and executives without much background in these areas, yet is of primary value to attorneys, accountants, and other seasoned professionals. Each episode brings you into engaging, sometimes humorous, conversations designed to entertain as it teaches. Each episode in the series is designed to be viewed independently of the other episodes so that participants will enhance their knowledge of this area whether they attend one, some, or all episodes. 7
  • 8. Episodes in this Series #1 Introduction to US Privacy and Data Security: Regulations and Requirements Premiere date: 08/03/22 #2: Introduction to EU General Data Protection Regulation: Planning, Implementation, and Compliance Premiere date: 9/07/22 #3: How to Build and Implement your Company's Information Security Program Premiere date: 10/12/22 #4: Data Breach Response: Before and After the Breach Premiere date: 11/09/22 8
  • 9. Episode #1: Introduction to US Privacy and Data Security: Regulations and Requirements 9
  • 10. Data Security and Privacy in the News • July 4, 2021 weekend: massive data breach, including over 700 million records exposed in LinkedIn breach (https://www.cbs17.com/news/investigators/linkedin- data-breach-exposes-info-of-700m-users/) • Pegasus Project confirms spyware used to track journalists in 20 countries (https://www.cpomagazine.com/cyber-security/data-leak-reveals-pegasus-spyware- found-in-use-unlawfully-in-20-countries-with-capability-to-break-current-iphone- security/) • July 23, 2021: priest resigns after media obtain location data showing use of Grindr through “commercially available app signal data” (https://time.com/6083323/bishop- pillar-grindr-data/)
  • 11. What is Data Security? • Confidentiality, availability, and integrity of data • All the practices and processes used to protect data from being used or accessed by unauthorized individuals • How a company safeguards the data it collects and uses from threats
  • 12. What is Data Privacy? • The appropriate use of data, including the use of data according to agreed purposes • How a company uses the data that it has collected
  • 13. What is Personal Information? • “personally identifiable information” sometimes called “PII” ✓ Can be linked to a specific individual ✓ Name, email, full postal address, birth date, SSN, driver’s license number, account numbers • “non-personally identifiable information” ✓ Cannot by itself be used to identify a specific individual ✓ Aggregate data, zip code, area code, city, state, gender, age
  • 14. What is Personal Information? (cont’d) • Gray area – “anonymized” data ✓ Non-PII that, when linked with other data, can effectively identify a person ✓ Geolocation data ✓ Site history and viewing patterns from IP address
  • 15. Why Do We Need to Protect It? • Data is a corporate asset • Corporate data is at a higher risk of theft or misuse than ever before • Consumers now expect companies to take initiative to protect both security and privacy – in the past several years, these topics have been increasingly discussed in public, particularly in light of social media uses of information and highly publicized data breaches
  • 16. What Must Companies Do to Protect It? • Compliance with state, local, federal laws and regulations ✓ Patchwork of laws developed by sector ✓ Contrast to Europe, which has a centralized, uniform law ✓ Makes it difficult to comply when multiple, possibly inconsistent laws apply • Contracts with third parties
  • 17. What Must Companies Do to Protect It? (cont’d) • Privacy policies for website users ✓ Don’t need one if: website is static, is purely B2B, and collects no PII from consumers ✓ Should cover: o Actual practices for PII and information that reasonably could be associated with a person or device, regarding collection, storage, use, and sharing of info ✓ Be aware of: financial information, medical information, children’s information • Privacy audits: ✓ Run them periodically to review and assess policies and practice for data
  • 18. What Must Companies Do to Protect It? (cont’d) • Your company may have more PII than you are aware of ✓ For example, if your company gives out commercial loans, it must comply with GLB ✓ BUT: if you also take guarantees, then you have personal information such as account information, possibly life insurance information, mortgage information, etc. that must be secured ✓ Have to think more creatively about what types of information you might be collecting o Credit card payments – have to secure that information
  • 19. California Consumer Privacy Act • Effective January 1, 2020, companies will have to observe restrictions on data monetization business models, accommodate rights to access, deletion, and porting of personal data, and update privacy policies • “Consumers” (defined as natural persons who are California residents) have the right to know what personal information a business has collected about them and what it is used for, the right to opt out of allowing a business to sell their personal information to third parties, the right to have a business delete personal information, and the right to receive equal servicing and pricing from a business even if they exercise their privacy rights under the Act.
  • 20. California Consumer Privacy Act (cont’d) • “personal information” is “any information that…relates to…a particular consumer or household” ✓ Information about a household may include information like utility bills or pricing • Companies must comply if they receive personal data from California residents and they or their parent company or a subsidiary exceed (a) annual gross revenues of $25 million, (b) obtains personal information of 50,000 or more California residents, households or devices annually, or (c) 50 percent or more annual revenue from selling California residents’ personal information.
  • 21. California Consumer Privacy Act (cont’d) • The Act provides a private right of action that allows consumers to seek, either individually or as a class, statutory or actual damages and injunctive relief, if their sensitive personal information is subject to unauthorized access and exfiltration, theft or disclosure as a result of a business’s failure to implement and maintain reasonable security measures ✓ Statutory damages can be between $100 and $750 per California resident per incident, or actual damages, whichever is greater
  • 22. Other State Privacy Laws • California Privacy Rights Act (CPRA): operative Jan. 1, 2023 and amends the CCPA • Virginia Consumer Data Protection Act: operative Jan. 1, 2023 • Colorado Privacy Act: operative July 1, 2023 • All statewide privacy laws currently apply to businesses which process data from over a certain threshold of consumers (usually 50,000 or 100,000) • All have different exemptions, definitions of “processor” or “controller,” different consumer rights and protections, and different penalties for noncompliance
  • 23. New York Stop Hacks and Improve Electronic Data Security (“SHIELD”) Act • Expands NY breach notification law and imposes data security program requirements on businesses that possess the private information of New York State residents • Applies regardless of whether the businesses have any physical presence in New York State • Program requirements include administrative, technical, and physical safeguards for detecting and responding to intrusions and maintaining security of information • Businesses subject to and in compliance with Gramm-Leach-Bliley, HIPAA, or the NY Dept. of Financial Services Cybersecurity Requirements are exempted from this requirement under the SHIELD Act
  • 24. New York Stop Hacks and Improve Electronic Data Security (“SHIELD”) Act (cont’d) • Limited reprieve for “small businesses” with fewer than fifty employees, less than $3 million in gross revenues in the last three fiscal years, or less than $5 million in year-end total assets • Expands the definition of “private information” subject to NY data breach notification law • NY Attorney General can pursue civil penalties, but there is no private right of action
  • 25. Massachusetts Standards – 201 C.M.R. 17 • 2010 law – most protective privacy and security law in the US at that time • Requires every business that licenses or owns personal information of Massachusetts residents to comply with the minimum security standards set forth in the regulation and implement a written information security program (“WISP”) with appropriate administrative, technical, and physical safeguards
  • 26. Massachusetts Standards – 201 C.M.R. 17 (cont’d) ✓ Standards must be consistent with those set forth in state and federal regulations to which a business is subject, including data breach notification laws, HIPAA, and the Gramm-Leach-Bliley Act • Require, when technically feasible, the encryption of personal information stored on portable devices and personal information transmitted across public networks or wirelessly • “personal information” – “a Massachusetts resident’s first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver’s license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident’s financial account.”
  • 27. New York Cybersecurity Regulation, 23 NYCRR Part 500 • Regulation from the New York Department of Financial Services, which went into effect March 2017 and was fully effective March 1, 2019 • Mandates minimum cybersecurity standards for any banking, insurance and brokerage firm using a license to operate in New York • Covered entities had to certify compliance June 1, 2020
  • 28. GDPR and the Shrems II Decision • 2020 decision from the Court of Justice of the European Union • Invalidated the US-EU Privacy Shield • Closes off key mechanisms for transferring personal data from the EU to the US • Shrems I invalidated European Commission adequacy decisions with respect to EU-U.S. Safe Harbor
  • 29. GDPR and the Shrems II Decision (cont’d) • CJEU was concerned with US government access to personal data for national security purposes and the rights of EU citizens in the US to judicial review and redress • CJEU found the U.S. was not according EU personal data the protection and rights of redress available in the EU • In June 2021, the European Commission adopted two sets of modernized Standard Contractual Clauses to allow for international data flows consistent with the decision
  • 30. EU-US Data Transfers Currently The EU and US are still in talks to come up with a replacement for Privacy Shield • On March 25, 2022, the European Commission President announced a new agreement with the US to expand Privacy Shield and permit EU-US data flows again • Companies can still use Standard Contractual Clauses and Binding Corporate Rules to permit data flows • This decision will also likely face a challenge – a Schrems III scenario
  • 31. Gramm-Leach-Bliley • Overseen by the FTC ✓ Requires financial institutions (companies that offer consumers financial products or services like loans, financial or investment advice, or insurance) – to explain their information-sharing practices to their customers and to safeguard sensitive data through use of privacy policies and prohibitions against disclosing non-public personal information to third parties ✓ Also requires financial institutions to protect the security and confidentiality of their customers’ non-public personal information
  • 32. HIPAA • The Health Insurance Portability and Accountability Act (HIPAA) regulates medical information. • HIPAA Privacy Rule: ✓ Requires appropriate safeguards to protect the privacy of “protected health information” (PHI). ✓ Sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. • Gives patients rights over their health information, including rights to examine and obtain a copy of their health records, and to request corrections.
  • 33. HIPAA (cont’d) • HIPAA Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of “electronic protected health information” (ePHI). • Privacy Rule and Security Rule are primarily enforced by the U.S. Department of Health & Human Services Office for Civil Rights.
  • 34. FTC Act • FTC is the main federal regulator in charge of policing privacy and cybersecurity practices among U.S. companies generally. • FTC derives its power from Section 5(a) of the FTC Act and pursues cases against companies for “unfair” or “deceptive” practices, where the company allegedly had inadequate cybersecurity practices, or overstated how comprehensive their privacy and cybersecurity practices were. • Consent decrees and settlements often result in monetary damages, and requirements that companies establish rigorous privacy and data security practices (which would be overseen by the FTC).
  • 35. Other Applicable Federal Laws • CAN-SPAM Act: regulates emails that companies send for commercial purposes and requires opt-out ability for consumers. • Telephone Consumer Protection Act (TCPA): restricts the making of telemarketing calls and creates a private right of action for consumers. • Fair Credit Reporting Act (FCRA): regulates consumer reporting agencies and the use of such information by private parties. • Children’s Online Privacy Protection Act (COPPA): regulates the collection and use of data belonging to children under 13
  • 36. State Level Data Breach Laws • All 50 states, the District of Columbia, and some U.S. territories have their own data breach notification laws • These laws generally require notification of affected individuals and regulators when a company suffers a breach of the security of an individual’s personally identifiable information (PII). • If a company suffers a data breach involving the PII of customers or employees who are resident in multiple states, it will need to comply with each applicable state’s laws.
  • 37. What is a Data Breach? (That May Trigger State Notification Laws) • Unauthorized acquisition of PII that compromises the security, confidentiality or integrity of PII… ✓ That results or could result in identity theft or fraud (OH) ✓ Unless PII is not used or subject to further unauthorized disclosure (NE) ✓ Unless no misuse of PII has occurred or is not reasonably likely to occur (NJ) ✓ Unless no reasonable likelihood of harm to consumer whose PII was acquired has resulted or will result (CT)
  • 38. What is a Data Breach? (That May Trigger State Notification Laws) (cont’d) ✓ That has caused or is likely to cause loss or injury to resident (MI) ✓ That causes or is reasonably likely to cause substantial economic loss to the individual (AZ) ✓ Unless no reasonable likelihood of financial harm to consumer whose PII was acquired has resulted or will result (IA)
  • 39. Why We Should be Careful with the Word “Breach” • Using “breach” to describe a data-privacy related incident assumes the incident meets the definition of a security breach which triggers various notification requirements • Be careful to notify the correct person/entity • An “incident” does not always rise to the level of “breach” (i.e., encryption safe harbor) • “Incident” is better received by the public than “breach”
  • 40. Standing for Data Breach Purposes • The Supreme Court in Ramirez v. TransUnion, 136 S. Ct. 1540 ruled in June 2021 that victims of a data breach may not have Article III standing unless they suffered “concrete” harm from the breach • Mere violations of a statute, even a statute which provides a private right of action, may not be sufficient for Article III standing in federal litigation • The Second Circuit recently ruled in Stevens v. Carlos Lopez that the increased risk of identity theft alone may not establish standing either but will depend on the facts of each particular case, and held that there was no circuit split (foreclosing a ripe opportunity for Supreme Court review of the issue)
  • 41. Breach Notification Laws • State laws differ with respect to: ✓ Deadline for notifying (14, 30, 45 days; reasonable time) ✓ Notification to Attorney General ✓ Notification to other State agencies ✓ Including Attorney General contact information ✓ Substitute notice (email, website, media) ✓ Specific facts of incident and type of PII compromised ✓ Maintaining records of incident (for 3-5 years) ✓ Countries also differ with notice requirements
  • 42. American Data Privacy and Protection Act • American Data Privacy and Protection Act – introduced in both the House and the Senate in June 2022 with bipartisan support • Provisions for: enhanced children’s protections, limits on targeted advertising, preemption over facets of state laws, and a limited private right of action • Also mandates a chief privacy officer position for organizations and imposes data minimization requirements • FTC would be charged with enforcement of its provisions
  • 44. About The Faculty Kathryn Nadro - knadro@sfgh.com Kathryn (“Katie”) Nadro leads Sugar Felsenthal Grais & Helsinger’s Data Security and Privacy practice. Katie advises clients on a diverse array of business matters, including data security and privacy compliance, commercial and business disputes, and employment issues. Katie works with individuals and businesses of all sizes to craft successful resolutions tailored to each individual matter. Katie is a Certified Information Privacy Professional (CIPP/US) and counsels clients on a variety of data security and privacy issues, including breach response, policy drafting, program management, data collection, vendor management, and compliance with ever-changing state, federal, and international privacy law. Katie also has broad litigation experience representing companies and individuals in contract, non-compete, discrimination, harassment, fiduciary duty, and trade secret litigation in state and federal court. With a background as both in-house and outside counsel, Katie understands that business objectives, time, and resources play an important role in reaching a favorable outcome for each client. 44
  • 45. About The Faculty Joseph P. Facciponti - josephfacciponti@dwt.com Joseph is a former federal prosecutor and in-house law department leader whose practice focuses on white-collar defense, internal investigations, cybersecurity, and data privacy. For nearly nine years, Joseph served as a prosecutor at the U.S. Attorney's Office for the Southern District of New York, where he handled complex and high-profile cases involving computer hacking, fraud, money laundering, and intellectual property theft. In 2010, he received an FBI Director's Award for outstanding cyber investigation, based on his work in investigating and disrupting a major international computer hacking ring that targeted financial institutions. 45
  • 46. About The Faculty Cassandra Porter - caporter@zuora.com Cassandra M. Porter is the Americas/APAC data privacy lead attorney for a Fortune 100 Tech company working to transform clients’ businesses, operations and technology models for the digital era. She counsels internal clients on privacy-related matters such as data collection practices, online advertising, mobile commerce, along with the development and acquisition of new technology, data incidents and management. Cassandra is a member of the inaugural class of Privacy Law Specialists, a new specialty recognized by the American Bar Association, and a Fellow of Information Privacy by the International Association of Privacy Professionals (IAPP). Her IAPP credentials as a Certified Information Privacy Professional and Certified Information Privacy Manager designate her as thought leader in the field. She is a former co-chair of the IAPP’s New Jersey Chapter and member of the Bankruptcy Lawyers Advisory Committee for the District of New Jersey. As a member of the United States Trustee’s Consumer Privacy Ombudsman (CPO) panel, she served as the CPO in the Golfsmith International chapter 11 cases. Previously she was counsel at Lowenstein Sandler LLP where, in addition to assisting clients with data privacy-related issues, she also regularly represented debtors in possession and creditors in chapter 11 matters along with indigents in chapter 7 proceedings in association with the Volunteer Lawyers for Justice. Prior to joining Lowenstein, she clerked for the Honorable Cecelia Morris, United States Bankruptcy Judge for the Southern District of New York and was the Assistant Managing Attorney at Kaye Scholer LLP. 46
  • 47. About The Faculty Alison Schaffer - aschaffer@jumptrading.com Alison Schaffer Bloom is Legal and Regulatory Counsel at the Jump Trading Group in Chicago. Alison works extensively in the areas of trading, technology, human resources, venture capital, and data protection and privacy. Specifically, Alison leads data protection and privacy application for all of the Jump Trading Group’s business lines globally. Alison graduated from Northwestern University with Honors in Legal Studies and Communication Studies and a Certificate in Service Learning and attained a Masters in Education while a Teach For America corps member in New York. Alison obtained her Juris Doctor from Chicago-Kent College of Law, where she was an avid member of the Trial Team. She is a member of the International Association of Privacy Professionals and holds the Certified Information Privacy Professional/Europe (CIPP/E), a preeminent certification for advanced concentration in European data protection laws, standards and practices. 47
  • 48. Questions or Comments? If you have any questions about this webinar that you did not get to ask during the live premiere, or if you are watching this webinar On Demand, please do not hesitate to email us at info@financialpoise.com with any questions or comments you may have. Please include the name of the webinar in your email and we will do our best to provide a timely response. IMPORTANT NOTE: The material in this presentation is for general educational purposes only. It has been prepared primarily for attorneys and accountants for use in the pursuit of their continuing legal education and continuing professional education. 48
  • 49. 49
  • 50.
  • 51. About Financial Poise 51 DailyDAC LLC, d/b/a Financial Poise™ provides continuing education to attorneys, accountants, business owners and executives, and investors. It’s websites, webinars, and books provide Plain English, entertaining, explanations about legal, financial, and other subjects of interest to these audiences. Visit us at www.financialpoise.com Our free weekly newsletter, Financial Poise Weekly, updates you on new articles published on our website and Upcoming Webinars you may be interested in. To join our email list, please visit: https://www.financialpoise.com/subscribe/