CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.

Slides:



Advertisements
Similar presentations
4-1 Chapter 4-Professional Liability and Medical Malpractice McGraw-Hill © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
1 TOP TEN LEGAL OVERSIGHTS THAT CAN SHUT DOWN YOUR WEBSITE © 2007 Brett J. Trout
Confidentiality and HIPAA
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
Security Controls – What Works
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Intellectual Property Boston College Law School February 13, 2008 Trade Secret – Part 3.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
SOX & ISO Protect your data and be ready to be audited!!!
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
RISK Risk management is a critical component in the successful operation of a student organization and in maintaining a healthy relationship between the.
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Chapter Two Ethical & Legal Issues.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Electronic Records Management: What Management Needs to Know May 2009.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Legal and Ethical Issues in Computer Security
WSV323. CSO/CIO department Regulation translated to control objectives Infrastructure Support Control objectives turned into control activities.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Chapter 16.1 Civil Cases. Types of Civil Lawsuits In civil cases the plaintiff – the party bringing the lawsuit – claims to have suffered a loss and usually.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Irish Centre for Commercial Law Studies Seminar 5 December 2002.
PowerPoint to accompany Law & Ethics For Medical Careers Fourth Edition Judson · Harrison · Hicks Chapter 4—Professional Liability and Medical Malpractice.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Chapter 4: Laws, Regulations, and Compliance
Protecting your Managed Services Practice: Are you at Risk?
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Workshop Understanding your responsibilities under the Data Protection Act 1998 and the Freedom of Information Act 2000 Adele Rhodes Girling.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Data Minimization Framework
Don’t get Burned: How to Protect Your Intellectual Property
Legal, Regulations, Compliance and Investigations
Legal Issues in Athletic Training
Chapter 3: IRS and FTC Data Security Rules
Information governance and information security
Cybersecurity compliance for attorneys
Computers: Tools for an Information Age
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Colorado “Protections For Consumer Data Privacy” Law
Introduction to Digital Forensics
Presentation transcript:

CyberLaw

Assignment Review

Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy –Intellectual property protection –Due diligence –E-Discovery –Compliance

Cyber LawCyberLaw 6/23/2016 CyberLaw 4 Forensics  Science of showing the unseen  Based in scientific principles  Use when presentation on court likely  Forensic Examiner is an expert witness –By virtue of education, training, experience, and procedures

Cyber LawCyberLaw 6/23/2016 CyberLaw 5 Forensics  Starts with forensic duplication of subject's hard drive –Write blocker prevents accidental updates –Forensic image exact and complete copy  Analyze a copy of hard drive  Discover deleted or concealed evidence  Discover evidence in system files –Expensive

Cyber LawCyberLaw 6/23/2016 CyberLaw 6 Chain of Custody  Essential to present evidence in court  Demonstrates no tampering with evidence  Log of every person accessing evidence and why  Created at beginning of incident/seizure

Cyber LawCyberLaw 6/23/2016 CyberLaw 7 Forensics used to:  In criminal cases by law enforcement to prosecute  In HR cases in organizations to show HR action appropriate  In Incident Response to hacking to determine loss and attack vector  In E-Discovery to determine facts

Cyber LawCyberLaw 6/23/2016 CyberLaw 8 Law and the Individual  We are subject to civil and criminal law  We do have rights –Privacy –To be informed  Data breach laws, some states

Cyber LawCyberLaw 6/23/2016 CyberLaw 9 Law and the Business  Also have individual rights  Additional responsibilities in case

Cyber LawCyberLaw 6/23/2016 CyberLaw 10 Intellectual Property Rights  The creator (usually) has rights in the event of: –Copyright –Trademark/Service Mark –Patent –Trade Secrets

Cyber LawCyberLaw 6/23/2016 CyberLaw 11 Due diligence  Obligation to perform as a reasonable person would under similar circumstances  Corporate officers also have added fiduciary responsibility  Professionals (InfoSEC) have a higher standard –Some buying “malpractice” insurance

Cyber LawCyberLaw Civil Law  Allows for one person to sue another for wrong doing  If one party has information that the other needs, they are bound to provide – and pay costs of production  Process called Discovery 6/23/2016 CyberLaw 12

Cyber LawCyberLaw 6/23/2016 CyberLaw 13 E-Discovery  Discovery is process of getting information from another  Most information now has origins in electronic form  E-Discovery is now big business  If you are sued you have a duty to protect information

Cyber LawCyberLaw 6/23/2016 CyberLaw 14 Compliance Requirements  We all have them –US –PCI-DSS –EU  Field in administrative law

Cyber LawCyberLaw 6/23/2016 CyberLaw 15 US  HIPAA  GLB  Sarbanes-Oxley  Privacy Act  FERPA  FERC  Common Law

PCI-DSS  No legislation needed  Credit Card Industry  Applies to all merchants and card processors  Sets minimum standards  Always a good springboard for discussion 6/23/2016 Cyber LawCyberLaw 16

Cyber LawCyberLaw 6/23/2016 CyberLaw 17 EU  PCI-DSS of course  Strong privacy requirements  US has safe harbor agreement w/ EU so US companies can do business in EU –Applies high privacy protection standard to company but not EU auditing –ICO

Data Breach Disclosure  Required by 46 states  All slightly different –What is a breach –What remediation is needed  Major driver behind increase in incident responders 6/23/2016 Cyber LawCyberLaw 18

Cyber LawCyberLaw 6/23/2016 CyberLaw 19 Standards  Frameworks –ISO –NIST –CoBIT –ITIL –SANS 20 Critical Controls

Cyber LawCyberLaw 6/23/2016 CyberLaw 20 Question for you  What did you find most interesting in the reading so far?

Cyber LawCyberLaw 6/23/2016 CyberLaw 21 Questions ?