Data Privacy and Information Security Compliance Under Heightened Scrutiny: Responding to a Data Breach or Cyber Attack
Recording of a 90-minute CLE webinar with Q&A
This CLE course will provide corporate counsel with an analysis of recent legal developments impacting data privacy and information security compliance. The panel will outline proactive strategies to reduce the likelihood of a data breach and provide best practices for responding if a breach occurs.
Outline
- Recent legal developments in cybersecurity
- Federal law developments
- State law developments, including the CCPA
- International law developments, including GDPR
- Recent litigation and settlements
- New privacy legislation
- The privacy phenomenon, globally and in the U.S.
- Crafting and implementing a comprehensive data privacy policy
- Complying with the California Consumer Privacy Act (CCPA)
- Assessing the risk of non-compliance with new privacy laws
- Translating new privacy legislation into enforceable organizational policies
- Designing new processes to implement privacy requirements
- Creating a data map
- Updating websites
- Making changes to IT systems
- Training resources
- Modifying vendor agreements
- Crafting and implementing a comprehensive data breach program
- Mitigating risk and impact of security breaches
- Restricting access to certain information
- Encryption of sensitive personal information that will be electronically transmitted
- Written security policies that are consistently enforced
- Internal training on appropriate response to data breach
- Regular monitoring of networks
- Contracting with cloud computing vendors
- Responding to security breaches
- What triggers notification?
- Rapid notification of key company officials
- Investigation of the breach
- Rapid notification of affected individuals and state officials
- Documenting actions taken in response to a security breach
- Litigation?
- Mitigating risk and impact of security breaches
- Risk transfer strategies for data privacy and security risks - cybersecurity insurance
- Coverage for data breaches -contractual indemnity
- Insurance coverage
- Other risk transfer strategies
Benefits
The panel will review these and other essential questions:
- What proactive strategies should counsel take to protect the private information of customers and employees and sensitive information belonging to the company and in the company’s possession but belonging to other entities?
- What risk management strategies should corporate counsel establish to minimize liability for disclosure of confidential information if a breach occurs?
- What terms and conditions should counsel attempt to include in agreements with vendors to minimize the risk of, and allocate liability for privacy violations and data breaches?
Faculty
Robert D. Brownstone
Technology & eDiscovery Counsel
Fenwick & West
Mr. Brownstone advises clients on information-security, data-privacy, electronic discovery, electronic information... | Read More
Mr. Brownstone advises clients on information-security, data-privacy, electronic discovery, electronic information management, retention/destruction policies, workplace technology-use policies and social-media rewards and risks. A nationwide advisor, speaker, writer and adjunct law professor on many law-and-technology issues, he is frequently quoted in the press as a resource on electronic information.
CloseIsis Miranda
Attorney
Freeman Mathis & Gary
Ms. Miranda concentrates her practice in civil litigation and advises on cyber liability, data privacy, and insurance... | Read More
Ms. Miranda concentrates her practice in civil litigation and advises on cyber liability, data privacy, and insurance coverage issues. A former information technology consultant, she is a frequent speaker on topics involving the intersection of technology and the law.
Close