Steven D. Grimberg United States Attorney’s Office Northern District of Georgia DATA SECURITY BREACHES.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Cyber Crime and Technology
Courts and the Quest for Justice. In Theory: Courtroom Ideals  Courts have extensive powers in our criminal justice system.  The courts legitimacy is.
Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
The Medicaid Investigations Division Douglas Thoren Special Deputy Attorney General Chief – Criminal Section Medicaid Investigations Division North Carolina.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
Carl Hoecker Inspector General, US Capitol Police Chair, CIGIE Investigations Committee.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Time Share Fraud Investigations
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Information Warfare Theory of Information Warfare
INTERNATIONAL COOPERATION Daniel H. Claman Senior Trial Attorney U.S. Department of Justice.
Wireless Access Code:
Computer Forensics BACS 371
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Threats and Attacks Principles of Information Security, 2nd Edition
Cyber-Warfare: The Future is Now!
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Nicholas Beckworth Annie Billings Steven Blair Nimmida Kulwattanasopon Thomas Wootten.
Seminar on Undercover Operations By GPTOC UN ODCCP.
Anglican Province of Canada Privacy Policy. Commitment to Privacy The Privacy Policy, including the Web Privacy Statement, is the Anglican Province of.
PRESENTATION TO SELECT COMMITTEE FOR SAFETY AND CONSTITUTIONAL AFFAIRS RSA UNITED ARAB EMIRATES POLICE COOPERATION AGREEMENT 2O SEPTEMBER 2006.
ISSUES IN FBI LAW ENFORCEMENT RELATED TO COUNTER-TERRORISM INVESTIGATIONS Ranjana Natarajan National Security Clinic University of Texas School of Law.
8/28/2015 The Family Educational Rights and Privacy Act (FERPA)  Also known as the Buckley Amendment.  Statute: 20 U.S.C. 1232g; Regulations: 34 CFR.
Sharing Of Sharing Of Information (FERPA) ©This TCLEOSE Course # 3952 curriculum is the intellectual property of CSCS-ICJS SBLE (2009)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Sunshine Center of the N.C. Open Government Coalition Feb. 27, 2015 NORTH CAROLINA SUNSHINE LAWS & GIS.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Cyber Security Nevada Businesses Overview June, 2014.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
The Warrant Process Chapter Three All Images © Microsoft Corporation Written by Karmel Tanner May 2010.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
The U.S. Securities and Exchange Commission (SEC).
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
FOIA 101 Office of Open Government Traci L. Hughes, Esq. –
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
FOIA Processing and Privacy Awareness at NOAA Prepared by Mark H. Graff NOAA FOIA Officer OCIO/GPD (301)
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
The Crime of Lawyer Theft Timothy J. O’Sullivan, Esq. Executive Director NYS Lawyers’ Fund for Client Protection.
Basic Forensics The Scene of the Crime. I. Forensic vocabulary A. Crime Scene: Physical location where a crime may have occurred. 1. Primary Crime Scene:
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
SEC 430 master Expect Success/sec430masterdotcom FOR MORE CLASSES VISIT
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Status of identity and privacy related AZ Legislative bills April 20, 2006 Mike Keeling ATIC, Chair.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Health Insurance Portability and Accountability Act of 1996
HIPAA THE PRIVACY RULE Reviewed December 2012.
Public Facilities and Cyber Security
Partnering to Minimize the Impact of Data Compromises
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Prosecuting International Intellectual Property Crimes
Forensic and Investigative Accounting
Texas Assisted Living Association 2019 Conference
Introduction to Digital Forensics
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

Steven D. Grimberg United States Attorney’s Office Northern District of Georgia DATA SECURITY BREACHES

Age / Skill Level Motivation Ego “Hack”tivism Money Trade secrets Intellectual capital Military/Government secrets Terrorism Hacktivists Criminals Nation- State Terrorists Cyber Criminals & Motivation

How They Do It Internet Phishing Social Engineering Exploiting Social Networking Insiders Old Fashioned Stealing Sophisticated Malware

Federal Agents Coordinate with Prosecutors Focus On Electronic Evidence Secure Computers/Hardware Request to Search by Consent Electronic Search Warrants Determine suspect IP address Traditional Investigative Steps Search Warrant / Surveillance Undercover / Confidential informant Banking/Transaction Records Confession THE CRIMINAL INVESTIGATION

Must navigate HIPAA and state privacy/data breach notification laws. Most data breach laws have law enforcement exceptions. HIPAA (45 C.F.R. § ) – if notice would “impede a criminal investigation or cause damage to national security.” –Obtain written statement from law enforcement specifying delay required. –Document oral request and delay up to 30 days. DATA BREACH NOTIFICATION

Minimize disruption to normal business operations Address issues re: theft of intellectual property Navigate HIPAA and state privacy/data breach notification laws Assess monetary loss and restitution issues Working With The Victim

Disclosure to law enforcement is treated with discretion. BUT … …Prosecutions are public forums. DISCLOSURE BEWARE

Steve Grimberg U.S. Attorney’s Office, ND GA LET’S TALK