Legal Risk Mitigation Strategies and Some Current Business Litigation Risks (Technology Related) Tracy Edmundson.

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
BLG E-COMMERCE RISKS: RISK MANAGEMENT IN PROFESSIONAL INDEMNITY KIT BURDEN PARTNER, BARLOW LYDE & GILBERT KIT BURDEN PARTNER, BARLOW LYDE & GILBERT.
National Smartcard Project Work Package 8 – Card Governance Report.
Recent Trends and Insurance Considerations March 2015
From Compliance to Competitive Advantage Eric Karofsky AMR Research
Consumers Online: Privacy, Security and Identity Professor Margaret Jackson and Marita Shelly Presentation to the RMIT Financial Literacy, Banking & Identity.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
ISO 9001 Interpretation : Exclusions
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Information Systems Controls for System Reliability -Information Security-
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
BIOTECH SUPPLY October 8-9, 2012 Crowne Plaza, Foster City, CA California Transparency in Supply Chain Act, SB 657, Chapter 556, Statutes of 2010 David.
How To Prepare To Sell Your Business: Steps To Take Now Susan Wissink Fennemore Craig.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
SMALL BUSINESS RESOURCE GUIDE CHECKLIST FOR GOING INTO BUSINESS.
 This presentation looks at: › What is risk management › How to identify risks › How to implement an effective risk management policy to increase your.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
THE CLOUD Risks and Benefits from the Business, Legal and Technology Perspective September 11, 2013 KEVIN M. LEVY, ESQ. GUNSTER YOAKLEY.
©2008, Promega Corporation. All rights reserved. ©2007, Promega Corporation. All rights reserved. Global Financial Crisis -- Practical Implications for.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
PEO Update 2005 AASCIF Legal Workshop George M. Parham Chief Legal Counsel Idaho State Insurance Fund.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Revised August 4, 2008 Contracts. What is a Contract? A contract is…… --An enforceable agreement between two parties --An agreement in which each party.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Compliance August 18, Agenda Outline Status Draft of Answers.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 8 Auditing in an E-commerce Environment
Protecting your Managed Services Practice: Are you at Risk?
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
Presented by: David Reid, DBA International
A Litigator’s View of Software License Agreements
What Small and Emerging Contractors Need to Know Understanding the Basics of Contract Surety Bonds © Copyright 2016 NASBP.
Hot Topics in the Financial Industry: Cybersecurity
Vendor Statements of Work: Your Role as an IT Professional
Data Minimization Framework
ENTERPRISE RISK MANAGEMENT IN THE CASE OF THE FINANCIAL SERVICE SECTOR
Drafting Key Commercial and Consumer Contract Terms
Mysale Information Classification 101
Preparing Your Managed Services Business for Sale
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
E&O Risk Management: Meeting the Challenge of Change
Privacy and Security in the Employment Relationship
Microsoft Corporation
I have many checklists: how do I get started with cyber security?
Cyber Issues Facing Medical Practice Managers
Organizational Ethics
Cyber Trends and Market Update
MOBILE INSURANCE LANDSCAPE AND KEY RISKS
Current Privacy Issues That May Affect Your Credit Union
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
By Joseph Carnevale, CIP Partner & Director of Sales
Mysale Information Classification 101
Welcome!.
Presentation To: Association of Corporate Counsel January 26, 2010
Developing the power sector in Federal Nepal Main lessons from international experience Kathmandu, November 06, 2018.
Cyber Security: What the Head & Board Need to Know
Colorado “Protections For Consumer Data Privacy” Law
Internet of Things: Risks and Tips to Manage Team
Anatomy of a Common Cyber Attack
The state of digital supplier risk management: In partners we trust
Presentation transcript:

Legal Risk Mitigation Strategies and Some Current Business Litigation Risks (Technology Related) Tracy Edmundson

Business Risk Management – Generally Much of what business attorneys (and other professional service providers such as accountants, consultants, insurance brokers, etc.) do is assist businesses with identifying and mitigating risk, otherwise known as risk management. All of a company’s advisors should be coordinated in assisting the company with risk management. Business advisors should take a multi-disciplinary approach to risk management – often think of risk management solely in the context of financial impact (reserves, insurance, etc.), but is really a part of fundamental business strategy. August 23, 2018 GDPR Overview

May Break Risks Down By Business Process Product Realization Process (Engineering and R&D) Demand Creation Process (Sales and Marketing) Supply Chain Process (Vendors and AP) Production Process (Manufacturing) Order Fulfillment Process (Shipping/Fulfillment) AR Process (Receipt of Payment/Collections) Other Key Business Processes (Specific To Business) August 23, 2018 GDPR Overview

Risk Management Process Identify the Risk Analyze the Risk Evaluate (or Rank) the Risk Treat the Risk – (minimize, mitigate, deal with residual risk) Monitor and review the Risk (i.e., wash, rinse and repeat) August 23, 2018 GDPR Overview

Treat the Risk – Legal Risk Mitigation A Business Attorney’s Toolbox Contains Multiple Risk Mitigation Strategies: Corporate Organizational and Governance Structure Risk Management in Corporate Policies and Procedures Risk Allocation in Contracts Proper Role of Insurance or Hedging Legal, Regulatory, and Standards Compliance August 23, 2018 GDPR Overview

Technology Risks Are Common Technology Risks Are Among The Most Pervasive Faced By Companies Data and Systems Security Data Privacy Compliance Product and Service Delivery (meet customer requirements and expectations) Other legal, regulatory, and compliance (product and software validations, regulatory agency compliance, cross-border compliance issues) Obsolescence August 23, 2018 GDPR Overview

Risk Mitigation Strategies – Risk Allocation Risk Allocation – as between two parties, who is responsible for assuming a particular risk and what are the consequences for failure to do so; Typically allocated in a contract of some sort; Common contractual areas: Scope of Work, Description of Services, Specifications, etc. (what the parties are doing for each other) Representations and Warranties Indemnities Insurance requirements Limitations on liability, remedies, warranties, etc. Areas you might not think of – choice of law, venue and jurisdiction; (anti-) assignment provisions, confidentiality, etc. August 23, 2018 GDPR Overview

Insurance Most businesses have typical coverages – General Liability, Property/Casualty, Automobile, Worker’s Comp., D&O, Employment Risk, etc. Technology/Cyber-Liability risk coverages should be considered standard for any business. Technology-Related E&O/Products/Completed Operations – addresses risk of businesses that deliver technology related goods or services (or for which technology is embedded in their goods and services). Cyber-Liability – addresses risks related to mishandling of customer or employee data. August 23, 2018 GDPR Overview

Legal, Regulatory, and Standards Compliance Data Privacy and Security – HIPAA, SOX, State Data Privacy Regulations, FCC/FTC. Products and Services – do your products or services comply with any third-party standards, requirement of any state or federal (or international) law, or any applicable state or federal (or international) regulations. Some regulatory issues beyond privacy – many standards and regulations address details of how products and services are designed, validated, tested, monitored, and specifications of the products or services. Examples – FDA, EPA, EU, IEEE, ANSI, ISO. Compliance must be built into key business processes. August 23, 2018 GDPR Overview

Some Areas of Current Technology Risk Management Headaches BYOD – Bring your own devices; Software and Device Management – maintenance, updates and patches. Data Privacy. EDI/Vendor Management. IoT – Internet of Things. PCI-DSS Compliance (credit card processing). ADA Compliance. Trade and Tariff Risks. Export Control Licenses. August 23, 2018 GDPR Overview

ADA Compliance Is currently a “hotbed” of potential class-action litigation; Claims currently are along the lines of any business website, electronic presences, application, or software may be a “place of public accommodation” and must be accessible; Many businesses have never considered ADA Accessibility with respect to their electronic presence; No regulatory recognized standard – de facto standard is the World Wide Web Consortium’s (W3C) Web Content Accessibility Guidelines 2.0 (WCAG 2.0) at Level A and Level AA. Basically, provides for all content to be visually and audibly accessible for people with accessibility issues. August 23, 2018 GDPR Overview

IoT Internet of Things devices are becoming ubiquitous; Uses are outpacing capability to secure, monitor, track and manage the devices; Many businesses incorporate IoT devices into their goods and services without considering the underlying security, origin, reliability, etc. of the devices; Unintended consequences abound ; Will be a major area of litigation in the coming years. August 23, 2018 GDPR Overview

Trade and Tariff Trade Wars and Tariffs create potential unmanaged financial and regulatory risks. Many businesses did not factor in increased tariffs in costing/pricing methodology. Agreements can allocate risk between purchaser and supplier. Increased Customs enforcement and review of tariff codes – delayed shipments. August 23, 2018 GDPR Overview

Export Controls Have more changes in sanctions and restrictions; Definition of controlled technology is changing; Iran; Huawei; Likely more Chinese issues going forward. August 23, 2018 GDPR Overview

Questions? Thank You! August 23, 2018 GDPR Overview