Compliance, Defensibility & Usability of Information on a Global Stage Monday, October 19, 2015 9:00 – 10:30 AM Global Legal Issues 1.

Slides:



Advertisements
Similar presentations
Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Core principles in the ASX CGC document. Which one do you think is the most important and least important? Presented by Casey Chan Ethics Governance &
The Data Protection (Jersey) Law 2005.
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
Protecting Personal Information Guidance for Business.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Corporate Ethics Compliance *
The Role of Risk Management and Assurance in Effective Organizational Governance Urton Anderson The University of Texas at Austin.
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
New Data Regulation Law 201 CMR TJX Video.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
Electronic Records Management: What Management Needs to Know May 2009.
Chapter 3 Internal Controls.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
Agency Risk Management & Internal Control Standards (ARMICS)
Why the Office of Compliance and Ethics was Created
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Information Governance Policies. Business Support and Corporate Information Resources Team… Working to create a knowledge led organisation Information.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Development of your Company’s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
The Internet of Things and Consumer Protection
1 PARCC Data Privacy & Security Policy December 2013.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
The Department of Defense Intelligence Oversight Program
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Data Protection and research Rachael Maguire Records Manager.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
Data protection—training materials [Name and details of speaker]
jasa.org Board of Directors Presentation & Training February 24 th, 2016 Corporate Compliance Program.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
#StartwithSecurity. Welcome Todd Kossow Acting Regional Director, Midwest Region Federal Trade Commission.
Data protection and data sharing
Information Security Program
Data Minimization Framework
Contingent Workforce: Global Privacy Laws Overview
Microsoft 365 Get help with regulatory compliance
Chapter 3: IRS and FTC Data Security Rules
GENERAL DATA PROTECTION REGULATION (GDPR)
Protecting Personal Information Guidance for Business.
General Counsel and Chief Privacy Officer
Red Flags Rule An Introduction County College of Morris
The State of Cybersecurity and
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Data protection and data sharing
General Data Protection Regulations 2018
Privacy and Cyber Security for Payroll Pros: A Global Perspective
Schoolnet Data Protection Policies
Anatomy of a Common Cyber Attack
Presentation transcript:

Compliance, Defensibility & Usability of Information on a Global Stage Monday, October 19, :00 – 10:30 AM Global Legal Issues 1

2

3

N ORA K URZOVA Chief Privacy Officer, Data Privacy & Records Management Tyco International Management Company A NTHONY M ARTIN Senior Associate General Counsel Privacy & Information Security Wal-Mart Stores M ARTY P ROVIN, CIPP/US Executive Vice President Jordan Lawrence 4 A NDREA A RIAS Attorney, Division of Privacy and Identity Protection Federal Trade Commission 4

5 The views expressed herein do not represent the Federal Trade Commission or anyone of it’s Commissioners. All views and opinions are solely those of the individual speaker for informational purposes and does not constitute legal advise.

“Do The Right Thing” Defensibility of Decisions Comply with Laws & Requirements 6

W HAT D OES A R EGULATOR C ARE A BOUT ?  Federal Agencies, States, ICO, CNIL  Past Experience  Future Experience 7

A NDI ’ S T OP 6 L IST 8

T OP 6 L IST 9 1.Storing information longer than needed when not necessary 2.Using default or easy-to-guess passwords 3.Storing or transmitting information in plain text 4.Failing to take steps to segment or restrict access to data 5.Failing to provide appropriate employee training or oversight 6.Failing to take reasonable steps to detect or investigate breaches

R ISK A NALYSIS C ONSIDERATIONS  Litigation  Regulation  Organizational Structure  Geographic Footprint  Past Experience 10

R ISK A NALYSIS C OMPONENTS  Start with Security 11  What personal information do you have?  Where is it?  How long are you keeping it?

R ISK A NALYSIS C OMPONENTS  Start with Security  Control Access to Data 12  How are you using personal information?  Who has access to sensitive data?

R ISK A NALYSIS C OMPONENTS  Start with Security  Control Access to Data  Require Passwords & Authentication 13  How is sensitive information protected?

R ISK A NALYSIS C OMPONENTS  Start with Security  Control Access to Data  Require Passwords & Authentication  Store Securely & Protect in Transit 14  How is sensitive information being stored?  How is sensitive information protected in transit?

R ISK A NALYSIS C OMPONENTS  Start with Security  Control Access to Data  Require Passwords & Authentication  Store Securely & Protect in Transit  Segment Network & Monitor Intrusion 15  Are you using industry-tested accepted methods?

R ISK A NALYSIS C OMPONENTS  Secure Remote Access to Network 16  Who has access to what?  Information encrypted?

R ISK A NALYSIS C OMPONENTS  Secure Remote Access to Network  Apply Sound Security Practices 17  Are policies written?  Is compliance verified?  Are employees adequately trained?

R ISK A NALYSIS C OMPONENTS  Secure Remote Access to Network  Apply Sound Security Practices  Ensure Vendors do the Same 18  Do you perform vendor risk assessments?

R ISK A NALYSIS C OMPONENTS  Secure Remote Access to Network  Apply Sound Security Practices  Ensure Vendors do the Same  Establish Processes/Procedures 19  What testing are you doing?  Are you up to date on patches?

R ISK A NALYSIS C OMPONENTS  Secure Remote Access to Network  Apply Sound Security Practices  Ensure Vendors do the Same  Establish Processes/Procedures  Secure Paper/Physical Media 20  Do employees securely dispose of sensitive information?

R EPORTING F INDINGS  Who are you reporting to?  How do you report?  How do you make it relevant? 21 Executive Leadership Team Board of Directors

W HAT D OES S UCCESS L OOK L IKE ?  Tone at the Top  Resources  Open Communication 22

I NFORMATION M ANAGEMENT C OMMITTEE  Privacy  Records Retention  Information Security  Litigation  Business Intelligence  Marketing 23

24

25  Federal Trade Commission |  European Commission |  National Association of Corporate Directors |  Federal Trade Commission | R ESOURCES

26 N ORA K URZOVA Tyco International Management Company A NTHONY M ARTIN Wal-Mart Stores M ARTY P ROVIN, CIPP/US Jordan Lawrence A NDREA A RIAS Federal Trade Commission