PENNSYLVANIA BAR ASSOCIATION PROFESSIONAL LIABILITY COMMITTEE

Slides:



Advertisements
Similar presentations
Secure IT 2005 Panel Discussion Felecia Vlahos, SDSU Sally Brainerd, UCSD Brooke Banks, CSU Chico.
Advertisements

Code of Ethics for Professional Accountants
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
1 1 Risk Management: How to Comply with Everything July 11, 2013.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
© Copyright 2003 Latham & Watkins. All Rights Reserved. USC Institute for Corporate Counsel The SEC’s New Part 205 Regulations Brian G. Cartwright March.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Recent Trends and Insurance Considerations March 2015
FERPA 2008 New regulations enact updates from over a decade of interpretations.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
TELLEFSEN AND COMPANY, L.L.C. SEC Regulation SCI and Automation Review Policy Compliance March 2013 Proprietary and Confidential.
Safety and Loss Control
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
© 2011 Foley Hoag LLP. All Rights Reserved. 1 What Law Applies In “the Cloud”? And how far into the Cloud does Massachusetts law extend? A CloudCamp Boston.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Panel Discussion on Identity Theft and PII Facilitated by Barry West, CIO Department of Commerce –Panelists: Kenneth Mortensen, DOJ Marc Groman, FTC Hillary.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
© Copyright 2010 Hemenway & Barnes LLP H&B
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Privacy Act United States Army (Managerial Training)
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Protecting the Public Trust Cyber Liability and Data Compromise; The New Risk Management Frontier Steve Spilde, Chief Executive Officer Brennan Quintus,
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance - Risk Exposures and Strategic Solutions
Law Firm Data Security: What In-house Counsel Need to Know
Technology Transfer and
Investigation Procedures
ACAA Summer Meeting Carrie O’Brien June 1, 2017
Managing a Cyber Event Steven P. Gibson President
Florida Information Protection Act of 2014 (FIPA)
Responding to a Data Breach 360° of IT Compliance
Cyber Incident Response When You Didn’t Have a Plan
Florida Information Protection Act of 2014 (FIPA)
Microsoft Corporation
Cyber Risk Management Through Vendor Contracts
Chapter 3: IRS and FTC Data Security Rules
Cyber Trends and Market Update
Alabama Data Breach Notification Act: What 911 Districts Need to Know
Cybersecurity compliance for attorneys
WHAT TO EXPECT: A CROWN CORPORATION’S GUIDE TO A SPECIAL EXAMINATION
Alabama Data Breach Notification Act: What County Governments Need to Know Morgan Arrington, General Counsel Association of County Commissions of Alabama.
National HIPAA Audioconferences
Cyber Security: What the Head & Board Need to Know
Upcoming PIPEDA Changes
Protecting Student Data
Anatomy of a Common Cyber Attack
School of Medicine Orientation Information Security Training
Presentation transcript:

PENNSYLVANIA BAR ASSOCIATION PROFESSIONAL LIABILITY COMMITTEE DELAWARE COUNTY BENCH BAR 2017

“Planning for Disaster” Featuring: Cyber Event Preparedness and Incident Response Planning

Viruses (Ransomeware $$$) Identity theft (The black market for personal information $$$) Back door to corporate clients (Insider trading / trade secrets / other confidential information) Consider the Panama papers!

Why Prepare? ? ?

Claims Can Happen! ? ?

Preparing is Key ? ?

OVERVIEW ? ? What is the purpose of an IRP? 2. What are the key components? ? Do law firms need one?

Purpose of an IRP An IRP is like an evacuation plan for a cyber security incident. It outlines step-by-step your response to a data security incident. Rather than try to respond to a data breach, document your response efforts, determine what laws apply, and ensure compliance during the stress of a breach, an IRP is developed pre-breach, and streamlines your response.

Purpose of an IRP STRESS Provides step-by-step guidance for responding to a breach and complying with potentially applicable laws and regulations. Streamlines and organizes your response to save time, money, stress, and downtime STRESS Creates documentation of your response efforts

Key Components of an IRP Team Members Method of Reporting and Timing Step by Step Incident Response Process Notification Requirements Insurance Carrier Information and Reporting Timeframe Post-Incident Investigation / Lessons Learned Testing of IRP Process Training of Employees

Key Components of an IRP Consider your IRP Team Members A lawyer? Office Administrator? IT? (Consider forensic experience) Outside counsel? (Consider privilege issues) Genesco v. Visa (2014) In re Target (2015))

Key Components of an IRP Step by Step Incident Reponse (Basic Overview): Discovering and reporting to the IRP team Ascertaining nature of Incident / systems compromised / length of time Ascertain if a data breach occurred (i.e. whether records were accessed, personal or confidential information therein, and affected clients/employees) Analyze how the breach occurred for future prevention

Key Components of an IRP Notification Requirements: Pennsylvania’s Breach of Personal Information Notification Act 73 Pa.C.S. 2301 et seq. An entity that maintains, stores or manages computerized data that includes personal information shall provide notice of any breach of the security of the system following discovery of the breach of the security of the system to any resident of this Commonwealth whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed and acquired by an unauthorized person. (73 Pa.C.S. 2303)

Key Components of an IRP Notification Requirements: How is a breach defined in Pennsylvania? “The unauthorized access and acquisition of computerized data that materially compromises the security or confidentiality of personal information maintained by the entity as part of a database of personal information regarding multiple individuals and that causes or the entity reasonably believes has caused or will cause loss or injury to any resident of this Commonwealth. . . .” 73 Pa. Stat. Ann. § 2302

Key Components of an IRP What is personal information? NAME linked with: SSN Drivers license number, OR Credit/Debit card + access code

Key Components of an IRP INSURANCE CARRIER INFORMATION & REPORTING TIMEFRAME

Key Components of an IRP LESSONS LEARNED TRAINING TESTING Implementing new training?

Do all law firms need an IRP? Consistent with our ethical duties in respect to competence, confidentilaity and safeguarding property Often a requirement for purchasing cyber insurance Certain laws require them HIPAA/HITECH GLBA YES! Often one of the first questions asked by investigating government agency Reduces time, expense, and stress of responding to a breach Presumption of compliance with notification laws of certain states PA, WV, NJ, DE It’s just good 21st century business