SlideShare una empresa de Scribd logo
1 de 26
V A N C O U V E R C A L G A R Y E D MO N T O N S A S K A T O O N R E G I N A L O N D O N K I T C H E N E R - W A T E R L O O G U E L P H T O R O N T O V A U G H A N MA R K H A M MO N T R É A L
How Your Nonprofit Can Avoid Data
Breaches and Ensure Privacy
Imran Ahmad
April 19, 2018
2
• Imran Ahmad is a partner at Miller
Thomson LLP and specializes in the
areas of cybersecurity, technology
and privacy law.
• Works closely with clients to
develop and implement practical
and informed strategies related to
cyber threats and data breaches.
• Adjunct Professor of Cybersecurity
Law at University of Toronto
• Author of Canada’s first legal
incident preparation and response
handbook titled A Handbook to
Cyber Law in Canada (published in
August 2017 by LexisNexis).
Imran Ahmad
3
1. What is Cybersecurity
2. Types of information clients have
3. Common types of cyber threats
4. Recent cyber attacks in the news
5. Legal landscape
6. Best practices before, during and after a breach
Agenda
4
What is Cybersecurity?
The process of protecting information by preventing, detecting, and responding
to attacks.
Source: National Institute of Standards and Technology. US Department of Homeland Security
Cybersecurity is the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to protect the cyber
environment and organization and user's assets.
Source: International Telecommunication Union
Cybersecurity is a state of being protected against the criminal or unauthorized
use of electronic data, or the measures taken to achieve this.
Source: Oxford Dictionary
5
• Customer information
• Financial and health info is
deemed to be “sensitive” under
privacy laws
• Company’s confidential &
proprietary information
• Intellectual property
• Internal investigations
• Business plans
• Supplier or Purchaser’s
confidential & proprietary
information
Types of information clients have
Source: Tales
6
• What is “Personal Information”?
• Subsection 2(1) of PIPEDA provides the
following definition:
• “information about an identifiable
individual”
• According to the OPC*, personal
information includes any factual or
subjective information, recorded or not,
about an identifiable individual.
• Examples:
• age, name, ID numbers, income,
ethnic origin, or blood type;
• opinions, evaluations, comments,
social status, or disciplinary actions;
and
• employee files, credit records, loan
records, medical records, existence of
a dispute between a consumer and a
merchant, intentions (for example, to
acquire goods or services, or change
jobs)
Personal Information
The Office of the Privacy Commissioner (“OPC”) is responsible for the administration
of PIPEDA.
7
Advanced
Persistent Threats
(i.e., breaking into
the network)
Cybercriminals,
Exploits and
Malware
Denial of Service
Attacks (“DDoS”)
Corporate
impersonation and
phishing
Employee mobility
and disgruntled
employees
Lost or stolen
laptops and mobile
devices
Inadequate security
and systems; third
party vendors
Common Types of Cyber Threats
8
• Classic cyber-attack: Breaking
into a network
• DDoS attack: Directing junk traffic
to a site and bringing it down
• Phishing attack: Email with
malware
• Whalling attack: Targeting senior
management + fraud
• Social Engineering: Targeting
specific individuals based on
publicly available info.
Types of breaches
9
• Cyber crime damages costs to
reach $6 trillion annually by 2021.
• Cybersecurity spending to exceed
$1 trillion from 2017 – 2021.
• Cyber crime will result in more than
tripling the number of unfilled
cybersecurity jobs, which is
predicted to hit 3.5 million by 2021.
• Human attack surface to reach 4
billion people by 2020.
• Global ransomware damage costs
are predicted to exceed $5 billion in
2017
Some Statistics
10
Recent Cyber Attacks in Canada
11
Areas of Risk and Sources of Attack:
Main Cyber Adversaries
Source: PricewaterhouseCoopers. Jason Green, Best Practices for
Data Security and Data Breach Protocol, ed (2015).
12
• Director and Officer liability
• Legal liability including litigation
• Regulator enforcement and
investigations
• Failure to meet key contract terms
• Economic harm (e.g. loss of
confidential information/IP)
• Reputational harm
• Business interruption
• Physical harm
Risk to Business
13
• Prime Minister mandated Minister of Public Safety:
Lead a review of existing measures to protect Canadians and our critical
infrastructure from cyber-threats, in collaboration with the Minister of National
Defence, the Minister of Innovation, Science and Economic Development, the
Minister of Infrastructure and Communities, the Minister of Public Services and
Procurement, and the President of the Treasury Board.
• Public Safety launched public
consultation in August 2016
On the Government’s Radar
Objectives
• tighten security
• introduce new laws
• improve coordination
• economic opportunities
14
• Minister of Public Safety launched
public consultation process in
August 2016
• Consultation will feed into new
legislation and national
cybersecurity strategy
• Likely to mirror what is required in
the US and in consistent with G7
principles on cybersecurity
On the Government’s Radar
15
CANADA
• Public sector privacy laws
• PIPEDA and other provincial and
sectoral privacy legislation
• Qc/AB/BC have privacy laws that
are substantially similar
• Health privacy laws
• Canadian Criminal Code
• Vital Cyber System Legislation
• Consultation process to launch
once draft legislation is released
• Quebec:
• Civil code (sections 35-41)
• Act to Establish Legal
Framework for Information
Technology
Legal Landscape
UNITED STATES
• Federal law
• Cybersecurity Information Sharing
Act
• Cybersecurity Enhancement Act of
2014
• Federal Exchange Data Breach
Notification Act of 2015
• National Cybersecurity Protection
Advancement Act of 2015
• State law
• Cybersecurity laws of New York
16
Canadian Privacy Landscape
17
• Digital Privacy Act, came into force on June 18,
2015 and amends PIPEDA in important ways
• Requires mandatory reporting of security breach
by organizations
• Notification to Privacy Commissioner
• All affected individuals who may suffer “significant
harm”
• Any Third Party who can mitigate losses
• Requires keeping security breach log of any data
breach involving personal information
• Fines of up to $100k for failure to report breach or
keep logs.
• While not currently in force, anticipated to come
into effect this year*
Digital Privacy Act
* Draft of Breach of Security Safeguard Regulations circulated in October 2017 for
public consultation.
18
• EUROPE
• Global Data Protection Regulation (GDPR)
• data breaches must be reported as soon as possible and, where feasible, no later than 72
hours after discovery of a breach.
• personal data now extending to location, IP address, RFID identifiers, as well as whole new
swathes of medical data, including genetic information.
• the “right to be forgotten” being enshrined in law, allowing people to request of search
engines to delete links to the data in question.
• regulation will apply to companies headquartered outside of Europe as long as they have
operations in Europe.
• greater rigour around consent to use personal data
• new requirements to carry out Privacy Impact Assessments (PIAs) to ensure that personal
data is sufficiently protected and privacy of the individual maintained.
• Network and Information Security Directive (NISD)
• complementary to GDPR, designed to create a focus on the protection of IT systems in
European critical national infrastructure
Legal Landscape
19
Litigation Exposure
20
Facts
• Sandra Jones and Winnie Tsige
worked @ different branches of
same bank
• Over 4 years, Tsige used her
workplace computer to access
Jones’ personal bank accounts at
least 174 times
• Jones sued for invasion of privacy
Findings
• Tort of intrusion upon seclusion
recognized by Ontario Court of
Appeal
• Plaintiff awarded $20k in damages
without demonstrating any
pecuniary loss occurred
• Liability arises where the invasion of
privacy is:
• Intentional or reckless
• Lacks legal justification
• Considered offensive to
reasonable person
Jones v. Tsige, 2012 ONCA 32
21
Facts
• Plaintiff and defendant were in
romantic relationship and made
video of a sexual nature
• They eventually broke up and
defendant posted video online
• Plaintiff could not sleep, focus on
school and eventually checked into
crisis center
• Plaintiff sued for disclosure of
private facts
Findings
• Court recognized the tort of public
disclosure
• Court found that:
• defendant made public an
aspect of the plaintiff's private
life
• reasonable person would find
the act of publication to be highly
offensive; and
• there was no legitimate public
concern justifying publication of
the matter
• Plaintiff awarded $100K due to
uniqueness of case
Jane Doe 464533 v. ND, 2016 ONSC 541
22
• We are also seeing claims arising
from:
• Breach of contract
• Negligence
• Breach of confidence
• Breach of fiduciary duty
• Breach of trust on part of the
holder of the data
• Claims have also been advanced
under tort of conversion and
breach of bailment law
• If data breach was result of
employee’s wrongful act, plaintiff
may be able to hold employer
organization vicariously liable
• Key takeaways
• Constant evolution
• Litigation bar is advancing
creative claims
• Courts are listening
• However, Courts recognize that
the standard is not perfection
but one of reasonableness
• Accordingly, Courts will look at
what steps the organization took
to mitigate the risks before a
breach occurs
Claims evolving...Courts listening
23
Governance
Source: NIST - National Institute Of Standards And Technology. Framework
for Improving Critical Infrastructure Cybersecurity, Version 1.0, February 12, 2014.
24
• Application whitelisting
• Assess risk profile
• Identify “Crown Jewels”
Know where you stand
• Bring together right people (IT, HR, Legal)
• Have a clear mandate
Build a Cyber Monitoring
Team
• Assess effectiveness of current security
• Consider whether to hire experts
Audit & Test Security
• Cyber hygiene
• Develop and disseminate cyber policies
• Refresh training
Educate and Train Staff
• Ensure your vendors have necessary security protocols in place
• Consider including language that requires them to tell you about a breach
• Consider indemnification clauses
Supply Chain Risk
• Plan should map out what to do in case of an attack
• Key considerations: public relations, legal, internal communication, etc.
Cyber incident plan
• Not a perfect solution
• Assess whether this is something that makes sense for business
• Make sure you have the right coverage
Cyber Insurance
• Target may not know that it has been compromised
• Requires forensic analysis
• Feeds into negotiations (reps/warranties/indemnities etc.)
M&A Cyber Due Diligence
Best Practices Pre-Attack
25
• Team should diligently record all steps taken
• Include external legal counsel for privilege reasons
Activate the Response
Team
• Block unauthorized access to network
• Implement steps to recover and/or restore lost information/data
• Address weaknesses of the network
Containment &
Assessment
• Consider transferring information/data to sanitized systems
• Establish clear chain of custody of data
Preservation of
Evidence
• Consider whether to notify individuals whose information has been
compromised
• Notification requirements to regulators/privacy agency
Notification
• Consider retaining a public relations firm for external messaging
• Determine what information needs to be communicated to whom
internally
Communication
Best Practices – During / Post-Breach
M I L L E R T H O M S O N . C O M
© 2016 Miller Thomson LLP. All Rights Reserved. All Intellectual Property Rights including
copyright in this presentation are owned by Miller Thomson LLP. This presentation may be
reproduced and distributed in its entirety provided no alterations are made to the form or
content. Any other form of reproduction or distribution requires the prior written consent of
Miller Thomson LLP which may be requested from the presenter(s).
This presentation is provided as an information service and is a summary of current legal
issues. This information is not meant as legal opinion and viewers are cautioned not to act on
information provided in this publication without seeking specific legal advice with respect to
their unique circumstances.
V A N C O U V E R C A L G A R Y E D MO N T O N S A S K A T O O N R E G I N A L O N D O N K I T C H E N E R - W A T E R L O O G U E L P H T O R O N T O V A U G H A N MA R K H A M MO N T R É A L

Más contenido relacionado

La actualidad más candente

Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsTrustArc
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighFRSecure
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 

La actualidad más candente (20)

Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & Implications
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad Nigh
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 

Similar a How your nonprofit can avoid data breaches and ensure privacy

Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmNext Dimension Inc.
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Amy Purcell
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 

Similar a How your nonprofit can avoid data breaches and ensure privacy (20)

Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law Firm
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Data Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam LawData Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam Law
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 

Más de TechSoup Canada

How Nonprofits Can Work with Online Volunteers
How Nonprofits Can Work with Online VolunteersHow Nonprofits Can Work with Online Volunteers
How Nonprofits Can Work with Online VolunteersTechSoup Canada
 
Power BI for TechSoup Canada
Power BI for TechSoup CanadaPower BI for TechSoup Canada
Power BI for TechSoup CanadaTechSoup Canada
 
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of AdsGoogle Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of AdsTechSoup Canada
 
Growth Strategies To Scale Up Your Small Nonprofit
Growth Strategies To Scale Up Your Small NonprofitGrowth Strategies To Scale Up Your Small Nonprofit
Growth Strategies To Scale Up Your Small NonprofitTechSoup Canada
 
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptechTen Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptechTechSoup Canada
 
How to be CASL & GDPR Compliant for the New Year 2019
How to be CASL & GDPR Compliant for the New Year 2019How to be CASL & GDPR Compliant for the New Year 2019
How to be CASL & GDPR Compliant for the New Year 2019TechSoup Canada
 
Phil Downe - Avoiding Shady IT Vendors (final version)
Phil Downe - Avoiding Shady IT Vendors (final version)Phil Downe - Avoiding Shady IT Vendors (final version)
Phil Downe - Avoiding Shady IT Vendors (final version)TechSoup Canada
 
Phil Downe - Avoiding Shady IT Vendors (full)
Phil Downe - Avoiding Shady IT Vendors (full)Phil Downe - Avoiding Shady IT Vendors (full)
Phil Downe - Avoiding Shady IT Vendors (full)TechSoup Canada
 
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...TechSoup Canada
 
How To Optimize Your Year End Fundraising
How To Optimize Your Year End Fundraising How To Optimize Your Year End Fundraising
How To Optimize Your Year End Fundraising TechSoup Canada
 
Creating a Content Strategy for your Nonprofit Website
Creating a Content Strategy for your Nonprofit WebsiteCreating a Content Strategy for your Nonprofit Website
Creating a Content Strategy for your Nonprofit WebsiteTechSoup Canada
 
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with ConfidenceAvoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with ConfidenceTechSoup Canada
 
Strategies for Donor Retention Using Your CRM Software
Strategies for Donor Retention Using Your CRM SoftwareStrategies for Donor Retention Using Your CRM Software
Strategies for Donor Retention Using Your CRM SoftwareTechSoup Canada
 
#nptech 2018: Trends, Insights, and Possibilities
#nptech 2018: Trends, Insights, and Possibilities#nptech 2018: Trends, Insights, and Possibilities
#nptech 2018: Trends, Insights, and PossibilitiesTechSoup Canada
 
Using QuickBooks to Audit-proof Your Nonprofit
Using QuickBooks to Audit-proof Your NonprofitUsing QuickBooks to Audit-proof Your Nonprofit
Using QuickBooks to Audit-proof Your NonprofitTechSoup Canada
 
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...TechSoup Canada
 
Update on Canada's Anti-Spam Legislation for Nonprofits and Charities
Update on Canada's Anti-Spam Legislation for Nonprofits and CharitiesUpdate on Canada's Anti-Spam Legislation for Nonprofits and Charities
Update on Canada's Anti-Spam Legislation for Nonprofits and CharitiesTechSoup Canada
 
Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017
Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017 Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017
Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017 TechSoup Canada
 
Finding Meaning in the Numbers
Finding Meaning in the NumbersFinding Meaning in the Numbers
Finding Meaning in the NumbersTechSoup Canada
 

Más de TechSoup Canada (20)

How Nonprofits Can Work with Online Volunteers
How Nonprofits Can Work with Online VolunteersHow Nonprofits Can Work with Online Volunteers
How Nonprofits Can Work with Online Volunteers
 
Power BI for TechSoup Canada
Power BI for TechSoup CanadaPower BI for TechSoup Canada
Power BI for TechSoup Canada
 
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of AdsGoogle Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
 
Growth Strategies To Scale Up Your Small Nonprofit
Growth Strategies To Scale Up Your Small NonprofitGrowth Strategies To Scale Up Your Small Nonprofit
Growth Strategies To Scale Up Your Small Nonprofit
 
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptechTen Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
 
How to be CASL & GDPR Compliant for the New Year 2019
How to be CASL & GDPR Compliant for the New Year 2019How to be CASL & GDPR Compliant for the New Year 2019
How to be CASL & GDPR Compliant for the New Year 2019
 
Phil Downe - Avoiding Shady IT Vendors (final version)
Phil Downe - Avoiding Shady IT Vendors (final version)Phil Downe - Avoiding Shady IT Vendors (final version)
Phil Downe - Avoiding Shady IT Vendors (final version)
 
Phil Downe - Avoiding Shady IT Vendors (full)
Phil Downe - Avoiding Shady IT Vendors (full)Phil Downe - Avoiding Shady IT Vendors (full)
Phil Downe - Avoiding Shady IT Vendors (full)
 
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
 
How To Optimize Your Year End Fundraising
How To Optimize Your Year End Fundraising How To Optimize Your Year End Fundraising
How To Optimize Your Year End Fundraising
 
Creating a Content Strategy for your Nonprofit Website
Creating a Content Strategy for your Nonprofit WebsiteCreating a Content Strategy for your Nonprofit Website
Creating a Content Strategy for your Nonprofit Website
 
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with ConfidenceAvoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
 
Strategies for Donor Retention Using Your CRM Software
Strategies for Donor Retention Using Your CRM SoftwareStrategies for Donor Retention Using Your CRM Software
Strategies for Donor Retention Using Your CRM Software
 
#nptech 2018: Trends, Insights, and Possibilities
#nptech 2018: Trends, Insights, and Possibilities#nptech 2018: Trends, Insights, and Possibilities
#nptech 2018: Trends, Insights, and Possibilities
 
Using QuickBooks to Audit-proof Your Nonprofit
Using QuickBooks to Audit-proof Your NonprofitUsing QuickBooks to Audit-proof Your Nonprofit
Using QuickBooks to Audit-proof Your Nonprofit
 
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
 
Microsoft Cloud for Good
Microsoft Cloud for GoodMicrosoft Cloud for Good
Microsoft Cloud for Good
 
Update on Canada's Anti-Spam Legislation for Nonprofits and Charities
Update on Canada's Anti-Spam Legislation for Nonprofits and CharitiesUpdate on Canada's Anti-Spam Legislation for Nonprofits and Charities
Update on Canada's Anti-Spam Legislation for Nonprofits and Charities
 
Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017
Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017 Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017
Be ahead of the tech curve, not behind! 5 nonprofit tech trends for 2017
 
Finding Meaning in the Numbers
Finding Meaning in the NumbersFinding Meaning in the Numbers
Finding Meaning in the Numbers
 

Último

2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…nishakur201
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024Energy for One World
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024ARCResearch
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 

Último (20)

2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 

How your nonprofit can avoid data breaches and ensure privacy

  • 1. V A N C O U V E R C A L G A R Y E D MO N T O N S A S K A T O O N R E G I N A L O N D O N K I T C H E N E R - W A T E R L O O G U E L P H T O R O N T O V A U G H A N MA R K H A M MO N T R É A L How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Imran Ahmad April 19, 2018
  • 2. 2 • Imran Ahmad is a partner at Miller Thomson LLP and specializes in the areas of cybersecurity, technology and privacy law. • Works closely with clients to develop and implement practical and informed strategies related to cyber threats and data breaches. • Adjunct Professor of Cybersecurity Law at University of Toronto • Author of Canada’s first legal incident preparation and response handbook titled A Handbook to Cyber Law in Canada (published in August 2017 by LexisNexis). Imran Ahmad
  • 3. 3 1. What is Cybersecurity 2. Types of information clients have 3. Common types of cyber threats 4. Recent cyber attacks in the news 5. Legal landscape 6. Best practices before, during and after a breach Agenda
  • 4. 4 What is Cybersecurity? The process of protecting information by preventing, detecting, and responding to attacks. Source: National Institute of Standards and Technology. US Department of Homeland Security Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user's assets. Source: International Telecommunication Union Cybersecurity is a state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. Source: Oxford Dictionary
  • 5. 5 • Customer information • Financial and health info is deemed to be “sensitive” under privacy laws • Company’s confidential & proprietary information • Intellectual property • Internal investigations • Business plans • Supplier or Purchaser’s confidential & proprietary information Types of information clients have Source: Tales
  • 6. 6 • What is “Personal Information”? • Subsection 2(1) of PIPEDA provides the following definition: • “information about an identifiable individual” • According to the OPC*, personal information includes any factual or subjective information, recorded or not, about an identifiable individual. • Examples: • age, name, ID numbers, income, ethnic origin, or blood type; • opinions, evaluations, comments, social status, or disciplinary actions; and • employee files, credit records, loan records, medical records, existence of a dispute between a consumer and a merchant, intentions (for example, to acquire goods or services, or change jobs) Personal Information The Office of the Privacy Commissioner (“OPC”) is responsible for the administration of PIPEDA.
  • 7. 7 Advanced Persistent Threats (i.e., breaking into the network) Cybercriminals, Exploits and Malware Denial of Service Attacks (“DDoS”) Corporate impersonation and phishing Employee mobility and disgruntled employees Lost or stolen laptops and mobile devices Inadequate security and systems; third party vendors Common Types of Cyber Threats
  • 8. 8 • Classic cyber-attack: Breaking into a network • DDoS attack: Directing junk traffic to a site and bringing it down • Phishing attack: Email with malware • Whalling attack: Targeting senior management + fraud • Social Engineering: Targeting specific individuals based on publicly available info. Types of breaches
  • 9. 9 • Cyber crime damages costs to reach $6 trillion annually by 2021. • Cybersecurity spending to exceed $1 trillion from 2017 – 2021. • Cyber crime will result in more than tripling the number of unfilled cybersecurity jobs, which is predicted to hit 3.5 million by 2021. • Human attack surface to reach 4 billion people by 2020. • Global ransomware damage costs are predicted to exceed $5 billion in 2017 Some Statistics
  • 11. 11 Areas of Risk and Sources of Attack: Main Cyber Adversaries Source: PricewaterhouseCoopers. Jason Green, Best Practices for Data Security and Data Breach Protocol, ed (2015).
  • 12. 12 • Director and Officer liability • Legal liability including litigation • Regulator enforcement and investigations • Failure to meet key contract terms • Economic harm (e.g. loss of confidential information/IP) • Reputational harm • Business interruption • Physical harm Risk to Business
  • 13. 13 • Prime Minister mandated Minister of Public Safety: Lead a review of existing measures to protect Canadians and our critical infrastructure from cyber-threats, in collaboration with the Minister of National Defence, the Minister of Innovation, Science and Economic Development, the Minister of Infrastructure and Communities, the Minister of Public Services and Procurement, and the President of the Treasury Board. • Public Safety launched public consultation in August 2016 On the Government’s Radar Objectives • tighten security • introduce new laws • improve coordination • economic opportunities
  • 14. 14 • Minister of Public Safety launched public consultation process in August 2016 • Consultation will feed into new legislation and national cybersecurity strategy • Likely to mirror what is required in the US and in consistent with G7 principles on cybersecurity On the Government’s Radar
  • 15. 15 CANADA • Public sector privacy laws • PIPEDA and other provincial and sectoral privacy legislation • Qc/AB/BC have privacy laws that are substantially similar • Health privacy laws • Canadian Criminal Code • Vital Cyber System Legislation • Consultation process to launch once draft legislation is released • Quebec: • Civil code (sections 35-41) • Act to Establish Legal Framework for Information Technology Legal Landscape UNITED STATES • Federal law • Cybersecurity Information Sharing Act • Cybersecurity Enhancement Act of 2014 • Federal Exchange Data Breach Notification Act of 2015 • National Cybersecurity Protection Advancement Act of 2015 • State law • Cybersecurity laws of New York
  • 17. 17 • Digital Privacy Act, came into force on June 18, 2015 and amends PIPEDA in important ways • Requires mandatory reporting of security breach by organizations • Notification to Privacy Commissioner • All affected individuals who may suffer “significant harm” • Any Third Party who can mitigate losses • Requires keeping security breach log of any data breach involving personal information • Fines of up to $100k for failure to report breach or keep logs. • While not currently in force, anticipated to come into effect this year* Digital Privacy Act * Draft of Breach of Security Safeguard Regulations circulated in October 2017 for public consultation.
  • 18. 18 • EUROPE • Global Data Protection Regulation (GDPR) • data breaches must be reported as soon as possible and, where feasible, no later than 72 hours after discovery of a breach. • personal data now extending to location, IP address, RFID identifiers, as well as whole new swathes of medical data, including genetic information. • the “right to be forgotten” being enshrined in law, allowing people to request of search engines to delete links to the data in question. • regulation will apply to companies headquartered outside of Europe as long as they have operations in Europe. • greater rigour around consent to use personal data • new requirements to carry out Privacy Impact Assessments (PIAs) to ensure that personal data is sufficiently protected and privacy of the individual maintained. • Network and Information Security Directive (NISD) • complementary to GDPR, designed to create a focus on the protection of IT systems in European critical national infrastructure Legal Landscape
  • 20. 20 Facts • Sandra Jones and Winnie Tsige worked @ different branches of same bank • Over 4 years, Tsige used her workplace computer to access Jones’ personal bank accounts at least 174 times • Jones sued for invasion of privacy Findings • Tort of intrusion upon seclusion recognized by Ontario Court of Appeal • Plaintiff awarded $20k in damages without demonstrating any pecuniary loss occurred • Liability arises where the invasion of privacy is: • Intentional or reckless • Lacks legal justification • Considered offensive to reasonable person Jones v. Tsige, 2012 ONCA 32
  • 21. 21 Facts • Plaintiff and defendant were in romantic relationship and made video of a sexual nature • They eventually broke up and defendant posted video online • Plaintiff could not sleep, focus on school and eventually checked into crisis center • Plaintiff sued for disclosure of private facts Findings • Court recognized the tort of public disclosure • Court found that: • defendant made public an aspect of the plaintiff's private life • reasonable person would find the act of publication to be highly offensive; and • there was no legitimate public concern justifying publication of the matter • Plaintiff awarded $100K due to uniqueness of case Jane Doe 464533 v. ND, 2016 ONSC 541
  • 22. 22 • We are also seeing claims arising from: • Breach of contract • Negligence • Breach of confidence • Breach of fiduciary duty • Breach of trust on part of the holder of the data • Claims have also been advanced under tort of conversion and breach of bailment law • If data breach was result of employee’s wrongful act, plaintiff may be able to hold employer organization vicariously liable • Key takeaways • Constant evolution • Litigation bar is advancing creative claims • Courts are listening • However, Courts recognize that the standard is not perfection but one of reasonableness • Accordingly, Courts will look at what steps the organization took to mitigate the risks before a breach occurs Claims evolving...Courts listening
  • 23. 23 Governance Source: NIST - National Institute Of Standards And Technology. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, February 12, 2014.
  • 24. 24 • Application whitelisting • Assess risk profile • Identify “Crown Jewels” Know where you stand • Bring together right people (IT, HR, Legal) • Have a clear mandate Build a Cyber Monitoring Team • Assess effectiveness of current security • Consider whether to hire experts Audit & Test Security • Cyber hygiene • Develop and disseminate cyber policies • Refresh training Educate and Train Staff • Ensure your vendors have necessary security protocols in place • Consider including language that requires them to tell you about a breach • Consider indemnification clauses Supply Chain Risk • Plan should map out what to do in case of an attack • Key considerations: public relations, legal, internal communication, etc. Cyber incident plan • Not a perfect solution • Assess whether this is something that makes sense for business • Make sure you have the right coverage Cyber Insurance • Target may not know that it has been compromised • Requires forensic analysis • Feeds into negotiations (reps/warranties/indemnities etc.) M&A Cyber Due Diligence Best Practices Pre-Attack
  • 25. 25 • Team should diligently record all steps taken • Include external legal counsel for privilege reasons Activate the Response Team • Block unauthorized access to network • Implement steps to recover and/or restore lost information/data • Address weaknesses of the network Containment & Assessment • Consider transferring information/data to sanitized systems • Establish clear chain of custody of data Preservation of Evidence • Consider whether to notify individuals whose information has been compromised • Notification requirements to regulators/privacy agency Notification • Consider retaining a public relations firm for external messaging • Determine what information needs to be communicated to whom internally Communication Best Practices – During / Post-Breach
  • 26. M I L L E R T H O M S O N . C O M © 2016 Miller Thomson LLP. All Rights Reserved. All Intellectual Property Rights including copyright in this presentation are owned by Miller Thomson LLP. This presentation may be reproduced and distributed in its entirety provided no alterations are made to the form or content. Any other form of reproduction or distribution requires the prior written consent of Miller Thomson LLP which may be requested from the presenter(s). This presentation is provided as an information service and is a summary of current legal issues. This information is not meant as legal opinion and viewers are cautioned not to act on information provided in this publication without seeking specific legal advice with respect to their unique circumstances. V A N C O U V E R C A L G A R Y E D MO N T O N S A S K A T O O N R E G I N A L O N D O N K I T C H E N E R - W A T E R L O O G U E L P H T O R O N T O V A U G H A N MA R K H A M MO N T R É A L