© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
© Chery F. Kendrick & Kendrick Technical Services.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Protecting Personal Information Guidance for Business.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Those Other Laws Dino Tsibouris Attorney at Law 2006 NCHELP FALL TRAINING CONFERENCE.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
© Chery F. Kendrick & Kendrick Technical Services.
An Act Relative to Security Freezes and Notification of Data Breaches Chapter 82 of the Acts of 2007 Massachusetts Digital Government Summit Securing Private.
Data Classification & Privacy Inventory Workshop
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
New Data Regulation Law 201 CMR TJX Video.
In the Belly of the Breach: What Every In-House Counsel Needs to Know about Data Breach Response ACC International Legal Affairs Committee Legal Quick.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
AUGUST 25, 2015 Cyber Insurance:
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
© 2011 Foley Hoag LLP. All Rights Reserved. 1 What Law Applies In “the Cloud”? And how far into the Cloud does Massachusetts law extend? A CloudCamp Boston.
© Copyright 2010 Hemenway & Barnes LLP H&B
HOW TO RESPOND TO A DATA BREACH: IT’S NOT JUST ABOUT HIPAA ANYMORE The Thirteenth National HIPAA Summit  September 26, 2006 Renee H. Martin, JD, RN, MSN.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Privacy and Data Breach Issues Kirk Herath, VP, Chief Privacy Officer, Nationwide & Dino Tsibouris, Founding Principal, Tsibouris & Associates.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Data Security Survival Skills for 21 st Century Evaluators Teresa Doksum & Sean Owen October 17, 2013.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Nassau Association of School Technologists
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
An Update on FERPA and Student Privacy
E&O Risk Management: Meeting the Challenge of Change
Protection of CONSUMER information
Regulatory Compliance
Florida Information Protection Act of 2014 (FIPA)
Responding to a Data Breach 360° of IT Compliance
E&O Risk Management: Meeting the Challenge of Change
What Business Owners Need to Know About Data Privacy
Florida Information Protection Act of 2014 (FIPA)
Chapter 3: IRS and FTC Data Security Rules
Protecting Personal Information Guidance for Business.
Information Security Law Update
UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.
Clemson University Red Flags Rule Training
National HIPAA Audioconferences
Move this to online module slides 11-56
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.

FOCUSED ON THE BUSINESS OF INSURANCE Federal Industry State

FOCUSED ON THE BUSINESS OF INSURANCE FEDERAL LAWS FTC Act Gramm- Leach- Bliley Act HIPAA

FOCUSED ON THE BUSINESS OF INSURANCE State Laws Consumer Protection Statutes and Regulations GLBA and HIPAA Add-Ons Social Security Number Laws Record Disposal Laws Data Security Laws Breach Notification Laws

FOCUSED ON THE BUSINESS OF INSURANCE Data Security Laws What Is Regulated? Personally Identifiable Information Name  Address   Phone  SS# xxx-xx-xxxx Drivers License  Credit Card #  Access Info 

FOCUSED ON THE BUSINESS OF INSURANCE Data Security Laws Who Is Regulated? Businesses that own, license, store or maintain PII about MA residents. Mass. Reg. Code tit. 201 § Operators of commercial websites, online services and mobile apps that collect PII about CA residents who use or visit the website or service. Cal. Bus. & Prof. Code § 22575(a)

FOCUSED ON THE BUSINESS OF INSURANCE Data Security Laws How Is It Regulated? Cal. Bus. & Prof. Code § 22575(b) Conspicuous Posting of Online Privacy Practices Identify PII Collected Categories of Third Parties With Whom PII Shared Explain How Consumer Can Review PII and Make Changes Explain How Consumer Will Be Notified if Privacy Policy Changes Do Not Track Mechanism

FOCUSED ON THE BUSINESS OF INSURANCE Data Security Laws How Is It Regulated? Comprehensive Written Information Security Program/Reasonable Security Procedures and Practices Technical Security Controls Ongoing Monitoring of Systems for Unauthorized Use

FOCUSED ON THE BUSINESS OF INSURANCE Breach Notification Laws Risk of Harm Threshold Format of Records Content of Letters Notice to Government Timing of Notification Liability for Failure to Comply

FOCUSED ON THE BUSINESS OF INSURANCE CURRY V. AVMED INC.  $ Compensation for victims of a data breach without requiring them to show actual economic loss from theft of personal data Unjust enrichment cause of action 2 corporate laptops stolen containing unencrypted information

FOCUSED ON THE BUSINESS OF INSURANCE Best Defense Against Breaches Strong Security Program Mandatory training for all employees Additional training for select employees GPS tracking capabilities Password protocols Physical security upgrades Update written data security policies and procedures