W w w. d u a n e m o r r i s. c o m Duane Morris - Firm and Affiliate Offices New York | London | Chicago | Houston | Philadelphia | San Diego | San Francisco.

Slides:



Advertisements
Similar presentations
2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A.
Advertisements

©2013 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris – Firm and.
Presented by: Natalie F. Hrubos, Esquire
JANUARY | 2005 T H E W O R L D ’ S L E A D I N G L E G A L M E D I A & I N F O R M A T I O N C O M P A N Y.
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
HIPAA and the TAS: Is it As Bad As We Thought It Would Be? Thoughts on Current Experiences and Problems Marty Ween, Esq Wilson Elser Moskowitz Edelman.
Forming Your HIPAA Compliance Plan PRESENTED BY. Daniel B. Brown, Esq. Healthcare Attorney Taylor English Duma LLP Jason Karn Director Training and IT.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
IS3350 Security Issues in Legal Context
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
©2010 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris – Firm and Affiliate Offices |
Communications Briefing: Navigating the clouds Sam Parr and Ian Walden Wednesday 21 October 2009, – 2.00 pm.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Information Security Information Technology and Computing Services Information Technology and Computing Services
©2010 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris – Firm and.
GSBlaw.com DATA SECURITY: LEGAL LANDSCAPE AND BEST PRACTICES November 16, 2011 Scott G. Warner Garvey Schubert Barer Seattle, Portland,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
NEW YORK WASHINGTON DENVER SEATTLE LOS ANGELES SAN FRANCISCO LONDON HONG KONG COMCAST OVERSAMPLE DEEP DIVES INTERNET SECURITY AND SAFETY ©PENN, SCHOEN.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Copyright, 2005 Pinnacle Entertainment, Inc. 1 Auditing the Windows Network Bart A. Lewin Chief Technology Officer Pinnacle Entertainment, Inc. CS 3-2.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
©2011 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris – Firm and.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
©2013 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris – Firm and.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Navigant Consulting, Inc. One vision, one strategy, one company.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Navigant Consulting, Inc. One vision, one strategy, one company.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
[ w w w. d u a n e m o r r i s. c o m ] ● ©2008 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. ●
BEIJING BRUSSELS CHICAGO DALLAS GENEVA HONG KONG LONDON LOS ANGELES NEW YORK SAN FRANCISCO SHANGHAI SINGAPORE TOKYO WASHINGTON D.C. What Pharmaceutical.
HIPAA Summit VII HIPAA Security Roundtable Richard D. Marks Davis Wright Tremaine LLP Washington, D.C. Seattle, Portland, San Francisco, Los Angeles, Anchorage,
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Scott Charney Cybercrime and Risk Management PwC.
Hurdles in implementation of cyber security in India.
©2009 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris – Firm and.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
1 Navigant Consulting, Inc. One vision, one strategy, one company Kelley School of Business X420 SCOOP Presentation January 20, 2005 Brian Pratt & Ben.
Security and Ethics Safeguards and Codes of Conduct.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Chapter 4: Laws, Regulations, and Compliance
Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551.
GREENBERG TRAURIG, LLP ATTORNEYS AT LAW ©2010. All rights reserved. LEGAL CONSIDERATIONS FOR ADVISER OUTSOURCING ARRANGEMENTS Contact: Arthur.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Information Security and Privacy in HRIS
Securing Information Systems
Law Firm Data Security: What In-house Counsel Need to Know
Add video notes to lecture
Securing the Law Firm Myth vs. Reality vs. Practicality:
Securing Information Systems
Personal Liability and Risk Management for
Information Systems Management
Chapter 13 Security and Ethical Challenges.
Confidentiality Agreement
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

w w w. d u a n e m o r r i s. c o m Duane Morris - Firm and Affiliate Offices New York | London | Chicago | Houston | Philadelphia | San Diego | San Francisco | Boston | Washington, D.C. Atlanta | Miami | Pittsburgh | Newark | Allentown | Wilmington | Harrisburg | Princeton | Westchester Duane Morris LLP - A Delaware limited liability partnership © 2005 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Navigant Legal Roundtable What You Must Know About IT Security and Privacy Law June 29, 2005 Sandra Jeskie, Esq. – Joseph Burton, Esq. – Michael Silverman, Esq. –

2 What Needs to be Protected? Types of information: –Trade secrets –Copyrighted information –Proprietary and/or confidential information –Customer data –Employee health care information –Pricing information

3 What Needs to be Protected? Legal Issues –COPPA –GLB –HIPAA –Sarbanes Oxley –Critical Information Infrastructure –SB 1386 –European Union Requirements –Others

4 What are the Data Management Risks? Top Ten Risks by IT Security Threat –Viruses and Worms7.6 –Outside Hacking or Cracking7.1 –Identity Theft and Phishing7.0 –Spyware6.8 –Denial of Service6.6 –Spam6.3 –Wireless and Mobile Device Viruses6.2 –Insider Threats6.2 –Zero Day Threats5.9 –Social Engineering5.9 –Cyber-Terrorism5.6 Respondents rate how critical each of the above security threats is to their organization (“1” means no concern at all; “10” means extremely concerned). Conducted in May 2005, the survey included responses from 133 North American organizations with global operations and revenues exceeding $750 million. Six of 10 surveys were completed by IT managers, with 91% overall answered by employees in IT departments. Source: Gartner Group Study, June 2005.

5 What are the Data Management Risks? Employees New Technologies Bad guys Outsourcing, service providers, business partners Errors Chocolate –BBC 2004 survey of London commuters 70% would reveal their computer passwords for a chocolate bar. 34% volunteered their passwords without being bribed.

6 What Needs to be Done to Protect the Data? Privacy Policies Security Policies Document Retention Programs Operational Safeguards Agreements with Business Partners Audits Education

7 What Happens When the Data Gets Out? Reporting Requirements –SB 1386 –SOX –CII Civil Liability Criminal Liability Incident Response/Mitigation Plans