SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Richard M. Borden
•  Cyber crime costs $400 billion annually – Lloyd’s
•  Global cyber insurance uptake growing 21% annually
•  $2.5 billion in written cyber premiums in 2016
•  Rating agencies now addressing cyber-maturity in credit ratings
•  Cybersecurity is dominant risk for CEOs
•  70% view it a major threat
•  $3 trillion market value destroyed in 2015
•  “Top 5” risk likelihood – 2017 World Economic Forum
•  Most companies remain unprepared:
•  Only 58% of companies have resources to comply with security regulations
•  1.5 million InfoSec job shortage by 2019
•  Only 21% of companies at “mature” stage
•  Only 1/3 of corporations have a data breach response plan
The Cybersecurity Backdrop
New York 23 NYCRR 500 - The Significance
•  Billed as a “first-in-the-nation”
regulation concerning
cybersecurity
•  Arguably the most stringent
broadly applicable cyber
regulation in existence
•  Goes beyond other data privacy
and cybersecurity regulations,
including the Graham Leach Bliley
Act
•  Covers information and systems
that do not include, store, process
or maintain PII
•  Requires new compliance
processes and is built around the
Risk Assessment
•  Likely modification and expansion
of existing protocols to meet
regulatory requirements
•  C-Suite must personally certify
compliance with the Regulation
on an annual basis
•  Each Covered Entity shall maintain a cybersecurity program designed
to protect the confidentiality, integrity and availability of the Covered
Entity’s Information Systems.
•  The cybersecurity program shall be based on the Covered Entity’s Risk
Assessment and designed to perform the following core cybersecurity
functions:
•  identifyandassessinternalandexternalcybersecurityrisksthatmaythreatenthesecurityor
integrityofNonpublicInformationstoredontheCoveredEntity’sInformationSystems
•  usedefensiveinfrastructureandtheimplementationofpoliciesandprocedurestoprotectthe
CoveredEntity’sInformationSystems,andtheNonpublicInformationstoredonthose
InformationSystems,fromunauthorizedaccess,useorothermaliciousacts
•  detectCybersecurityEvents
•  respondtoidentifiedordetectedCybersecurityEventstomitigateanynegativeeffects
•  recoverfromCybersecurityEventsandrestorenormaloperationsandservices
•  fulfillapplicableregulatoryreportingobligations
The Main Requirement – 500.02
•  InformationSystemmeansadiscretesetofelectronicinformationresources
organizedforthecollection,processing,maintenance,use,sharing,disseminationor
dispositionofelectronicinformation,aswellasanyspecializedsystemsuchas
industrial/processcontrolssystems,telephoneswitchingandprivatebranch
exchangesystems,andenvironmentalcontrolsystems.
The Main Requirement – 500.02 (cont.)
•  NonpublicInformationshallmeanallelectronicinformationthatisnotPublicly
AvailableInformationandis:
•  BusinessrelatedinformationofaCoveredEntitythetamperingwithwhich,orunauthorizeddisclosure,
accessoruseofwhich,wouldcauseamaterialadverseimpacttothebusiness,operationsorsecurityof
theCoveredEntity
•  anyinformationconcerninganindividualwhichbecauseofname,number,personalmark,orother
identifiercanbeusedtoidentifysuchindividual,incombinationwithanyoneormoreofthefollowingdata
elements:(i)socialsecuritynumber,(ii)drivers’licensenumberornon-driveridentificationcardnumber,(iii)
accountnumber,creditordebitcardnumber,(iv)anysecuritycode,accesscodeorpasswordthatwould
permitaccesstoanindividual’sfinancialaccount,or(v)biometricrecords
•  anyinformationordata,exceptageorgender,inanyformormediumcreatedbyorderivedfromahealth
careprovideroranindividualandthatrelatesto(i)thepast,presentorfuturephysical,mentalorbehavioral
healthorconditionofanyindividualoramemberoftheindividual'sfamily,(ii)theprovisionofhealthcareto
anyindividual,or(iii)paymentfortheprovisionofhealthcaretoanyindividual
The Main Requirement – 500.02 (cont.)
Information Governance Implications
•  What systems are considered
“Information Systems” that must be
protected under 500.02?
•  What is “Nonpublic Information” that
is not Personal Data/Personally
Identifiable Information?
•  The Regulation required new types
of system and data classification.
•  It is critical to know what systems
house, process and access
Nonpublic Information.
•  Written Data Governance Policies
and Procedures are required to be
part of the Cybersecurity Policy,
which must be approved by Senior
Officer(s). 500.03(b)
•  The Risk Assessment, which is the
basis of the Cybersecurity Program
and the related Policies and
Procedures, requires written criteria
for assessment of the Program
including adequacy of controls.
500.09
•  There are requirements to dispose
of Nonpublic Information. 500.13
•  Systems must be maintained that
“are designed to reconstruct
material financial transactions
sufficient to support normal
operations and obligations….”
500.06
•  The Regulation requires a Covered Entity to submit to DFS a
written Certification of Compliance by February 15, 2018
•  The written statement would require the signature of the
Chairperson of the Board of Directors of the entity or named
Senior Officer(s) (i.e. CEO or committee) certifying that such
person has reviewed documents, reports, certifications and
opinions of such officers, employees, representatives and
outside vendors
•  Similar to a Sarbanes-Oxley 404 certification
Annual Compliance Certification
EU Global Data Protection Regulation (GDPR)
•  The EU General Data Protection
Regulation (GDPR) replaces the Data
Protection Directive and was designed
to harmonize data privacy laws across
Europe, to protect and empower all EU
citizens data privacy and to reshape
the way organizations across the
region approach data privacy.
•  The GDPR not only applies to
organizations located within the EU but
it will also apply to organizations
located outside of the EU if they offer
goods or services to, or monitor the
behavior of, EU data subjects. It
applies to all companies processing
and holding the personal data of data
subjects residing in the European
Union, regardless of the company’s
location.
•  Organizations can be fined up to 4% of
annual global turnover for breaching
GDPR or €20 Million. This is the
maximum fine that can be imposed for
the most serious infringements e.g. not
having sufficient customer consent to
process data or violating the core of
Privacy by Design concepts. There is a
tiered approach to fines e.g. a
company can be fined 2% for not
having their records in order (article
28), not notifying the supervising
authority and data subject about a
breach or not conducting impact
assessment. It is important to note that
these rules apply to both controllers
and processors -- meaning 'clouds' will
not be exempt from GDPR
enforcement.
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance

Más contenido relacionado

La actualidad más candente

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?Patrick Soenen
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Mark Honeyball
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.James Seville
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsJon Bosco
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?TrustArc
 

La actualidad más candente (20)

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?
 

Similar a Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management Black Duck by Synopsys
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviSharique Rizvi
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...PECB
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 

Similar a Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance (20)

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 

Más de ARMA International

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)ARMA International
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other DocumentsARMA International
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA International
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherARMA International
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...ARMA International
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...ARMA International
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...ARMA International
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackARMA International
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)ARMA International
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryARMA International
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsARMA International
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...ARMA International
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceARMA International
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...ARMA International
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesARMA International
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseARMA International
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyARMA International
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceARMA International
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RIARMA International
 

Más de ARMA International (20)

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines Together
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies Attack
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information Investments
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information Governance
 
Gene Stakhov - Taxonology
Gene Stakhov - TaxonologyGene Stakhov - Taxonology
Gene Stakhov - Taxonology
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be Machines
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership Journey
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
 

Último

Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 

Último (20)

Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 

Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance

  • 1.
  • 3.
  • 4. •  Cyber crime costs $400 billion annually – Lloyd’s •  Global cyber insurance uptake growing 21% annually •  $2.5 billion in written cyber premiums in 2016 •  Rating agencies now addressing cyber-maturity in credit ratings •  Cybersecurity is dominant risk for CEOs •  70% view it a major threat •  $3 trillion market value destroyed in 2015 •  “Top 5” risk likelihood – 2017 World Economic Forum •  Most companies remain unprepared: •  Only 58% of companies have resources to comply with security regulations •  1.5 million InfoSec job shortage by 2019 •  Only 21% of companies at “mature” stage •  Only 1/3 of corporations have a data breach response plan The Cybersecurity Backdrop
  • 5. New York 23 NYCRR 500 - The Significance •  Billed as a “first-in-the-nation” regulation concerning cybersecurity •  Arguably the most stringent broadly applicable cyber regulation in existence •  Goes beyond other data privacy and cybersecurity regulations, including the Graham Leach Bliley Act •  Covers information and systems that do not include, store, process or maintain PII •  Requires new compliance processes and is built around the Risk Assessment •  Likely modification and expansion of existing protocols to meet regulatory requirements •  C-Suite must personally certify compliance with the Regulation on an annual basis
  • 6. •  Each Covered Entity shall maintain a cybersecurity program designed to protect the confidentiality, integrity and availability of the Covered Entity’s Information Systems. •  The cybersecurity program shall be based on the Covered Entity’s Risk Assessment and designed to perform the following core cybersecurity functions: •  identifyandassessinternalandexternalcybersecurityrisksthatmaythreatenthesecurityor integrityofNonpublicInformationstoredontheCoveredEntity’sInformationSystems •  usedefensiveinfrastructureandtheimplementationofpoliciesandprocedurestoprotectthe CoveredEntity’sInformationSystems,andtheNonpublicInformationstoredonthose InformationSystems,fromunauthorizedaccess,useorothermaliciousacts •  detectCybersecurityEvents •  respondtoidentifiedordetectedCybersecurityEventstomitigateanynegativeeffects •  recoverfromCybersecurityEventsandrestorenormaloperationsandservices •  fulfillapplicableregulatoryreportingobligations The Main Requirement – 500.02
  • 8. •  NonpublicInformationshallmeanallelectronicinformationthatisnotPublicly AvailableInformationandis: •  BusinessrelatedinformationofaCoveredEntitythetamperingwithwhich,orunauthorizeddisclosure, accessoruseofwhich,wouldcauseamaterialadverseimpacttothebusiness,operationsorsecurityof theCoveredEntity •  anyinformationconcerninganindividualwhichbecauseofname,number,personalmark,orother identifiercanbeusedtoidentifysuchindividual,incombinationwithanyoneormoreofthefollowingdata elements:(i)socialsecuritynumber,(ii)drivers’licensenumberornon-driveridentificationcardnumber,(iii) accountnumber,creditordebitcardnumber,(iv)anysecuritycode,accesscodeorpasswordthatwould permitaccesstoanindividual’sfinancialaccount,or(v)biometricrecords •  anyinformationordata,exceptageorgender,inanyformormediumcreatedbyorderivedfromahealth careprovideroranindividualandthatrelatesto(i)thepast,presentorfuturephysical,mentalorbehavioral healthorconditionofanyindividualoramemberoftheindividual'sfamily,(ii)theprovisionofhealthcareto anyindividual,or(iii)paymentfortheprovisionofhealthcaretoanyindividual The Main Requirement – 500.02 (cont.)
  • 9. Information Governance Implications •  What systems are considered “Information Systems” that must be protected under 500.02? •  What is “Nonpublic Information” that is not Personal Data/Personally Identifiable Information? •  The Regulation required new types of system and data classification. •  It is critical to know what systems house, process and access Nonpublic Information. •  Written Data Governance Policies and Procedures are required to be part of the Cybersecurity Policy, which must be approved by Senior Officer(s). 500.03(b) •  The Risk Assessment, which is the basis of the Cybersecurity Program and the related Policies and Procedures, requires written criteria for assessment of the Program including adequacy of controls. 500.09 •  There are requirements to dispose of Nonpublic Information. 500.13 •  Systems must be maintained that “are designed to reconstruct material financial transactions sufficient to support normal operations and obligations….” 500.06
  • 10. •  The Regulation requires a Covered Entity to submit to DFS a written Certification of Compliance by February 15, 2018 •  The written statement would require the signature of the Chairperson of the Board of Directors of the entity or named Senior Officer(s) (i.e. CEO or committee) certifying that such person has reviewed documents, reports, certifications and opinions of such officers, employees, representatives and outside vendors •  Similar to a Sarbanes-Oxley 404 certification Annual Compliance Certification
  • 11.
  • 12. EU Global Data Protection Regulation (GDPR) •  The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. •  The GDPR not only applies to organizations located within the EU but it will also apply to organizations located outside of the EU if they offer goods or services to, or monitor the behavior of, EU data subjects. It applies to all companies processing and holding the personal data of data subjects residing in the European Union, regardless of the company’s location. •  Organizations can be fined up to 4% of annual global turnover for breaching GDPR or €20 Million. This is the maximum fine that can be imposed for the most serious infringements e.g. not having sufficient customer consent to process data or violating the core of Privacy by Design concepts. There is a tiered approach to fines e.g. a company can be fined 2% for not having their records in order (article 28), not notifying the supervising authority and data subject about a breach or not conducting impact assessment. It is important to note that these rules apply to both controllers and processors -- meaning 'clouds' will not be exempt from GDPR enforcement.