Dr. Don Lloyd Cook Gill Ragon Owen, PA.  Practicing law in AR since 1989  Virginia Tech, Ph.D. in Marketing ◦ Virginia Tech Congressional Fellow in.

Slides:



Advertisements
Similar presentations
Confidentiality: What Is Our Responsibility?
Advertisements

IT Security Policy Framework
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
HIPAA Regulations What do you need to know?.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Steps to Compliance: Risk Assessment PRESENTED BY.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Understanding Privacy Breach Risk: Ontario Universities Risk Management Symposium Presented by Brian Rosenbaum LL.B. Director, Legal and Research Practice.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Internal Auditing and Outsourcing
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
THE CLOUD Risks and Benefits from the Business, Legal and Technology Perspective September 11, 2013 KEVIN M. LEVY, ESQ. GUNSTER YOAKLEY.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
What to Expect and How to Prepare: Healthcare Security & Privacy Regulation and Enforcement in 2015 and Beyond.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
The Privacy Symposium – Summer 2008 Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach © Aug 2007.
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Compliance August 18, Agenda Outline Status Draft of Answers.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 8 Auditing in an E-commerce Environment
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Liability Insurance for an unsecure world
DOL Employee Benefit Plan Audits & How to Prepare
E&O Risk Management: Meeting the Challenge of Change
Regulatory Compliance
By: Eamon Callahan and Wilston Johnston
What Does It Mean To Be A Privacy Professional?
General Counsel and Chief Privacy Officer
Red Flags Rule An Introduction County College of Morris
Cyber Exposures The Importance of Risk Identification and Transfer
By Joseph Carnevale, CIP Partner & Director of Sales
CompTIA Security+ Study Guide (SY0-401)
Cyber Security: What the Head & Board Need to Know
Introduction to the PACS Security
PERSONALLY IDENTIFIABLE INFORMATION: AUDIT CONSIDERATIONS
Presentation transcript:

Dr. Don Lloyd Cook Gill Ragon Owen, PA

 Practicing law in AR since 1989  Virginia Tech, Ph.D. in Marketing ◦ Virginia Tech Congressional Fellow in the office of Congressman Rick Boucher (1996)  Taught at Louisiana Tech University, Georgia State University and University of New Mexico.

 Certified Information Privacy Professional (CIPP) 2004; CIPP/Canada 2006  Acxiom Corporation ◦ Privacy and Risk Consultant  Feeva Technology ◦ Chief Privacy Officer and later General Counsel  Walmart, Inc ◦ Director of Privacy  Lunarline, Inc ◦ Director of Privacy

 Counsel at Gill Ragon Owen, P.A. ◦ Member of the Privacy and Data Management Practice ◦ Principal Blogger at “The View from 30,000 Feet”  (we will come back to this later) ◦ Ponemon Institute Distinguished Fellow

 Breaches are common ◦ 4,457 DATA BREACHES made public since 2005 ◦ Over 900 million records breached  Breaches are expensive (Ponemon Institute) ◦ Average cost per record breached of $145  Regulators are paying attention ◦ New laws, new techologies  Consumers and Investors are paying attention ◦ Just ask Gregg Steinhafe.

 Higher Ed Breaches in the Last Year (handout via the Chronology of Data Breaches)  22 significant breaches  Over 1 million records breached  Costs ◦ Direct vs. indirect ◦ Damage to brand equity  Admissions  Donor support (GT)

 FERPA  FACTA  HIPAA/HITECH  Notification Framework  Minnesota Plastic Card Security Act  Regulatory Actions  Civil Litigation

 Network Operations ◦ Multiple networks and access points  Internet Usage and Social Networks  Outsourcing  IT Implementation  Healthcare and Additional Miscellaneous Risks  Decentralized Culture  Massive record keeping  Academic and Personal Freedom  Budget

 University of Miami (2008) ◦ Backup tapes containing 2.1 million medical records stolen from off-site storage  Hired expert to determine whether information on tapes was accessible  Notified 47,000 individuals whose financial information was compromised  Established website and call center to handle information requests

 UCLA Health Systems ( ) ◦ Employees of the health system, repeatedly and without authorization viewed protective health information of patients (celebrities) ◦ Office of Civil Rights investigated ◦ UCLA agreed to corrective action and paid a settlement of $865,000

 Unidentified Major State University ( ) ◦ Since 2009 more than 100,000 faculty, alumni, student and parent records, including names, SSNs, credit card information ◦ Class action lawsuit seeking 2 years credit monitoring, fraud resolution services for affected individuals ◦ Also seeks injunction mandating the university take additional measures to protect personally identifiable information

 Be Proactive  Privacy by Design for New Applications, particular for BYOD  Develop the expertise, internally and externally ◦ Information inventory ◦ Policies and procedures  Build a culture of privacy  Contractual risk sharing and insurance

 International Association of Privacy Professionals (IAPP) ◦ Education and Certification ◦ Daily Dashboard and other resources  The View from 30,000 Feet The View from 30,000 Feet ◦ Privacy blog from Gill Ragon Owen

 Perform an information audit so you can evaluate your risk  Strong passwords and encryption  Use social media for advertising and building relationships, not for monitoring employees  Look at your partner/vendor contracts. Who bears the risk?  Make your policies clear and enforce them  Flash drives are evil  BYOD is a godsend/disaster  SECURE YOUR NETWORKS

 An ounce of prevention can be worth big bucks down the road!  Outsourcing may be cheaper  Capitalize on the misfortune of others  Insurance can help you manage the risk  There are software solutions, vendors, experts and other resources to steer you through the process  Shredders are cheap!

?