SlideShare una empresa de Scribd logo
1 de 13
Complex Issues – Here to Stay
CyberGroup
cybersecurity/data breach/privacy™
Complex Issues — Here to Stay
• Sophisticated Threats, Evolving Technology, Internet of Things
• Healthcare—frequently attacked industry
• Ransomware attacks
• 100 million healthcare records compromised 2015 (credit card, email, SSN, employment, med history data)
• High price on black market “dark internet”
• Cyber thieves use data to launch spear phishing attacks, commit fraud, steal medical identities
• But no industry immune—
• Manufacturing (automotive, chemical, IP networks)
• Financial Services (consumer banking, mobile apps)
• Government (IRS and HHS breaches)
• Transportation (freight, shipping, air)
• Retail/Wholesale
• Professional Services (engineering, accounting, law firms)
2
Costs
• Predicting costs of data breaches--DIFFICULT--lack of quality data.
• High INTEREST among firms at risk, insurance carriers, researchers,
and social planners.
• Based on recent survey data estimates the average cost of a data
breach is around $6.5 million (or, $217 per record; Ponemon 2015).
• Averages may be misleading: median losses may be lower but still
significant.
• Similarly skewed values arise for phishing and security incidents.
• Privacy violations, however, account for a much larger median loss of
$1.3 million.
3
Statistics Do Not Account For:
• Business interruption
• Reputational loss
• Customer retention/loss
• Cost of allocation of resources/time
• Responding to private litigation
• Potential class actions
• Federal and state regulatory investigations
4
Dealing With Threats
• There is no 100%
• Compliance ≠ Security
• Prioritize business objectives w/in risk tolerance
• Management of contractual relationships/terms
• Proactive Security Plan with technology and policy
• Coordinated and tested incident response plan
• Prepare Response to the Inevitable Attack
• Understand threat landscape
• Access right resources and skills
• Promote Culture of Security Awareness
• Train
• Avoid careless mistakes
• Protect key IP and business assets
5
Legal Management Issues
• Effective Privacy Notices
• Industry Specific Regulations
• Federal
• State
• Assessment of Legal Duties/ Disclosure
• Determination of Key Areas for Cyberinsurance
• Contractual Matters
• Indemnification
• Limitation of Liability
• Risk Transfer
• Representations & Warranties
• Acquisitions- Due Diligence
6
Legal Ramifications
• PRIVATE LITIGATION
• Suppliers, commercial customers
• Third Parties (no privity)
• Consumers, individuals, class actions
• GOVERNMENT INVESTIGATIONS
• State laws/ Attorney General Actions
• Federal Laws/ FTC and Industry Specific Regulations
• Privacy Actions
• Criminal Violations
In federal courts approximately 1700 pending legal actions over 50% are private civil actions,
17% are criminal actions.
7
FTC Real Life Lessons
• LABMD, A clinical laboratory, experienced unusual data breaches that
compromised personal, medical information of 9300 consumers. The FTC’s
decision, relying on extensive expert testimony, found that from 2005 to 2010
LabMD failed to:
• maintain file integrity monitoring;
• provide intrusion detection;
• monitor digital traffic across its firewalls;
• delete no longer needed consumer data;
• provide security training to employees;
• implement a strong password policy (a number of employees used the same password
“labmd”);
• update its software to deal with known vulnerabilities;
• control administrative rights to employee laptops and allowed employees to download any
software, business related or not;
• prevent use of peer-to-peer software (LimeWire), which enabled download of a file
containing 1,718 pages of confidential information on approximately 9,300 consumers
8
Lessons From LABMD
• FTC has made it clear that any industry in possession of sensitive
consumer data (such as names, addresses, dates of birth, Social
Security numbers, and insurance information) will be required to
maintain reasonable data security practices
• Enforcement actions may result even if there has been no identifiable harm
to the subjects of such data.
• the FTC is going to assert its authority expansively and stay in the cyber cop
business.
• In a data breach case, no actual harm is necessary.
• Employers must train their employees on infoSEC
• COMPANIES MUST establish reasonable protocols commensurate with their
risk profile to try to protect against cyber intrusions.
9
Role Of Management And Board
• Duty To Maintain, Grow, And Protect The Assets Of The Company
• Public Company Risks
• Failure To Maintain Adequate Controls
• Failure To Disclose
• Failure To Investigate And Make Informed Judgments
• Shareholder Actions And Derivative Claims
• Government Focus On Individual Liability
• Indemnification Issues
10
What You Need in Place in Before,
During & After
• Management commitment
• Clear lines of communication
• Set infosec as an organizational priority
• Specialized knowledge
• Business compliance and continuity plans
• Policies and procedures for data protection
• Statutory compliance by industry/profession/location
• Employee training/ response teams
• WHEN THE INFORMATION SECURITY/CYBER PROBLEM HAPPENS (and it will)
• 24/7 responsiveness w/ resources
• Ability to contain harm/ calm management of crisis
• Guidance on legal duties/notification/reputation management
• Dealing with government bodies
• Positioning/shaping facts w/future litigation in mind
• Avoid exorbitant costs/ potential liabilities
11
THINK IN THREE PHASES
•Legal
•Insurance
•IT/Network
•PR
•Forensic
Testing
Before a
Problem
Arises
•Legal
•PR
•Insurance
•Forensic
Investigation
Responding
to a Breach
•Legal
•PR
•IT/Network
Post Breach
12
Questions / Contact Information:
Glenn E. Davis
Lead Partner
HBCyberGroup
www.HeplerBroom.com |
glenn.davis@helperbroom.com
Direct: 314.480.4154 | Mobile: 314.550.5122
13

Más contenido relacionado

La actualidad más candente

Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
Aspiration Software LLC
 

La actualidad más candente (19)

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Review questions
Review questionsReview questions
Review questions
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
S719a
S719aS719a
S719a
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 

Destacado

Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015
Randy V. Miller
 
Almanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaAlmanática - O almanaque da Matemática
Almanática - O almanaque da Matemática
Prof. Materaldo
 
PDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation Services
PDS Tech Inc.
 
Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )
Sean Fitzgerald
 

Destacado (20)

Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015
 
Bitten By Python
Bitten By PythonBitten By Python
Bitten By Python
 
Super pac hacks for your library
Super pac hacks for your librarySuper pac hacks for your library
Super pac hacks for your library
 
India’s First SAS based SAN deployment
India’s First SAS based SAN deploymentIndia’s First SAS based SAN deployment
India’s First SAS based SAN deployment
 
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
 
Almanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaAlmanática - O almanaque da Matemática
Almanática - O almanaque da Matemática
 
Test
TestTest
Test
 
Ahmed my gfmer course experience
Ahmed my gfmer course experienceAhmed my gfmer course experience
Ahmed my gfmer course experience
 
Dx bumil
Dx bumilDx bumil
Dx bumil
 
Regulamento Junte & Ganhe
Regulamento Junte & GanheRegulamento Junte & Ganhe
Regulamento Junte & Ganhe
 
Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013
 
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
 
PDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation Services
 
Apresentação evarejo
Apresentação evarejoApresentação evarejo
Apresentação evarejo
 
Fel Flyer F11
Fel Flyer F11Fel Flyer F11
Fel Flyer F11
 
Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )
 
mark resume 2015
mark resume 2015mark resume 2015
mark resume 2015
 
Personal Work
Personal WorkPersonal Work
Personal Work
 
ford company
ford companyford company
ford company
 
I.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOSI.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOS
 

Similar a 74 x9019 bea legal slides short form ged12.12.16

Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Lisa Abe-Oldenburg, B.Comm., JD.
 

Similar a 74 x9019 bea legal slides short form ged12.12.16 (20)

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 

Último

一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
VarshRR
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 

Último (20)

一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 

74 x9019 bea legal slides short form ged12.12.16

  • 1. Complex Issues – Here to Stay CyberGroup cybersecurity/data breach/privacy™
  • 2. Complex Issues — Here to Stay • Sophisticated Threats, Evolving Technology, Internet of Things • Healthcare—frequently attacked industry • Ransomware attacks • 100 million healthcare records compromised 2015 (credit card, email, SSN, employment, med history data) • High price on black market “dark internet” • Cyber thieves use data to launch spear phishing attacks, commit fraud, steal medical identities • But no industry immune— • Manufacturing (automotive, chemical, IP networks) • Financial Services (consumer banking, mobile apps) • Government (IRS and HHS breaches) • Transportation (freight, shipping, air) • Retail/Wholesale • Professional Services (engineering, accounting, law firms) 2
  • 3. Costs • Predicting costs of data breaches--DIFFICULT--lack of quality data. • High INTEREST among firms at risk, insurance carriers, researchers, and social planners. • Based on recent survey data estimates the average cost of a data breach is around $6.5 million (or, $217 per record; Ponemon 2015). • Averages may be misleading: median losses may be lower but still significant. • Similarly skewed values arise for phishing and security incidents. • Privacy violations, however, account for a much larger median loss of $1.3 million. 3
  • 4. Statistics Do Not Account For: • Business interruption • Reputational loss • Customer retention/loss • Cost of allocation of resources/time • Responding to private litigation • Potential class actions • Federal and state regulatory investigations 4
  • 5. Dealing With Threats • There is no 100% • Compliance ≠ Security • Prioritize business objectives w/in risk tolerance • Management of contractual relationships/terms • Proactive Security Plan with technology and policy • Coordinated and tested incident response plan • Prepare Response to the Inevitable Attack • Understand threat landscape • Access right resources and skills • Promote Culture of Security Awareness • Train • Avoid careless mistakes • Protect key IP and business assets 5
  • 6. Legal Management Issues • Effective Privacy Notices • Industry Specific Regulations • Federal • State • Assessment of Legal Duties/ Disclosure • Determination of Key Areas for Cyberinsurance • Contractual Matters • Indemnification • Limitation of Liability • Risk Transfer • Representations & Warranties • Acquisitions- Due Diligence 6
  • 7. Legal Ramifications • PRIVATE LITIGATION • Suppliers, commercial customers • Third Parties (no privity) • Consumers, individuals, class actions • GOVERNMENT INVESTIGATIONS • State laws/ Attorney General Actions • Federal Laws/ FTC and Industry Specific Regulations • Privacy Actions • Criminal Violations In federal courts approximately 1700 pending legal actions over 50% are private civil actions, 17% are criminal actions. 7
  • 8. FTC Real Life Lessons • LABMD, A clinical laboratory, experienced unusual data breaches that compromised personal, medical information of 9300 consumers. The FTC’s decision, relying on extensive expert testimony, found that from 2005 to 2010 LabMD failed to: • maintain file integrity monitoring; • provide intrusion detection; • monitor digital traffic across its firewalls; • delete no longer needed consumer data; • provide security training to employees; • implement a strong password policy (a number of employees used the same password “labmd”); • update its software to deal with known vulnerabilities; • control administrative rights to employee laptops and allowed employees to download any software, business related or not; • prevent use of peer-to-peer software (LimeWire), which enabled download of a file containing 1,718 pages of confidential information on approximately 9,300 consumers 8
  • 9. Lessons From LABMD • FTC has made it clear that any industry in possession of sensitive consumer data (such as names, addresses, dates of birth, Social Security numbers, and insurance information) will be required to maintain reasonable data security practices • Enforcement actions may result even if there has been no identifiable harm to the subjects of such data. • the FTC is going to assert its authority expansively and stay in the cyber cop business. • In a data breach case, no actual harm is necessary. • Employers must train their employees on infoSEC • COMPANIES MUST establish reasonable protocols commensurate with their risk profile to try to protect against cyber intrusions. 9
  • 10. Role Of Management And Board • Duty To Maintain, Grow, And Protect The Assets Of The Company • Public Company Risks • Failure To Maintain Adequate Controls • Failure To Disclose • Failure To Investigate And Make Informed Judgments • Shareholder Actions And Derivative Claims • Government Focus On Individual Liability • Indemnification Issues 10
  • 11. What You Need in Place in Before, During & After • Management commitment • Clear lines of communication • Set infosec as an organizational priority • Specialized knowledge • Business compliance and continuity plans • Policies and procedures for data protection • Statutory compliance by industry/profession/location • Employee training/ response teams • WHEN THE INFORMATION SECURITY/CYBER PROBLEM HAPPENS (and it will) • 24/7 responsiveness w/ resources • Ability to contain harm/ calm management of crisis • Guidance on legal duties/notification/reputation management • Dealing with government bodies • Positioning/shaping facts w/future litigation in mind • Avoid exorbitant costs/ potential liabilities 11
  • 12. THINK IN THREE PHASES •Legal •Insurance •IT/Network •PR •Forensic Testing Before a Problem Arises •Legal •PR •Insurance •Forensic Investigation Responding to a Breach •Legal •PR •IT/Network Post Breach 12
  • 13. Questions / Contact Information: Glenn E. Davis Lead Partner HBCyberGroup www.HeplerBroom.com | glenn.davis@helperbroom.com Direct: 314.480.4154 | Mobile: 314.550.5122 13