Scott & Scott, LLPPage 1 Business Impact of a Data Breach Research Sponsored by Scott & Scott, LLP Julie Machal-Fulks May 23, 2007.

Slides:



Advertisements
Similar presentations
Latest Developments in Privacy Robert J. Scott Managing Partner.
Advertisements

Who Are We? Michael Smith Heidi Alderton Health & Safety Service 15 Hours per Week at SOAS.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
My Name is Todd Davis My Social Security # is
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
Data Breach Notification Toolkit Mary Ann Blair Director of Information Security Carnegie Mellon University September 2005 CSG Sponsored by the EDUCAUSE.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Negotiating License Agreements with Oracle and Microsoft Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
1 1 Horwath InternationalCopyright 2006 Crowe Chizek and Company LLC 1 IT Audits – Understanding the Standards Illinois Digital Government Summit September.
Robert J. Scott, Esq. Mariqus Alexander Managing PartnerDirector of IT Services.
Mergers & Acquisitions For Managed Service Providers Robert J. Scott Scott & Scott, LLP
BUSINESS CONTINUITY PLANNING FOR SMALL TO MEDIUM ENTERPRISES Presented and written by Jamie Whitford-Robson Corporate Business Continuity Lead.
Occupational Health, Safety & Environment Training OHS Responsibilities and Duty of Care.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Bullying by Pilar Janis, Lead & Higher Education Counselor TEXAS HOUSE BILL 1942 (Asher’s Law)
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Ponemon Institute© Private & Confidential DocumentPage 1 Recent Research on Privacy, Trust and Data Protection The Privacy Symposium at Harvard University.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Medical Risk Management 1 st South American Congress Risk Management Santiago, Chile August 6 & 7, 2012 By: Geoffrey Hayton Claims Counsel for Adventist.
State Program Review Process Presented by GSFC Compliance Team.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The Cloud and the Law Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
The State of Computer & Data Security in Corporations Independent Survey.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Litigating Copyright Infringement Claims Related to Competing Software Applications Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Top Threats WG Co-Chair Jon-Michael Brook. Agenda About our Top Threats Polling the industry Call for participation Categorizing our Top Threats.
First Responder Support Tools (FiRST app): An Overview 2011 : The Office of Bombing Prevention provides a concept and technical requirements to DHS’ Science.
Dartmouth College Alumni Leaders Preparing Your Class, Club or Group Tax Return October 6, 2015.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)
Practical IT Research that Drives Measurable Results Craft a Compensation Strategy March 2012.
Behavior Supports How Does the Caregiver Support the Client Who is Experiencing Frustrations?
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
IOSH Midlands South Branch Legal Update 30 September 2015 Andrew Litchfield – Wragge Lawrence Graham & Co LLP.
Essentials of Incident Reporting. An Incident (or Near Miss) is: “any unexpected or unintended event … that leads to (or could have led to) harm, loss.
CMG Events 2016 Cybersecurity Briefing 24 February 2016 John Magee William Fry.
Stanley Estime, MSCI QA/QI Specialist January 17, 2013 Reportable New Information.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
© 2004 SHRM SHRM Weekly Online Survey: June 8, 2004 Computer Viruses and Employee Productivity Sample comprised of 369 randomly selected HR professionals.
RESPONDING TO AN ESSAY PROMPT. The Prompt Write an essay describing how technology affects people’s lives.
Hot Topics in Technology Transactions Presented by: Robert J. Scott
The process of identifying and controlling the risks is called Risk Management.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
The Need of CSIRT in Enterprise Keyur Desai – Vice President - IT
Technology and Media Law
IRB reporting updates.
Responding to Intrusions
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Personal data breach notification Be prepared!
Reporting personal data breaches to the ICO
CITE THIS CONTENT: RYAN MURPHY, “EVENT REPORTING”, ACCELERATE UNIVERSITY OF UTAH HEALTH CURRICULUM, JUNE 1, 2018 (Updated August 24, AVAILABLE AT: 
Detecting, reporting & investigating data breaches under GDPR
Possible liaison motion for IEEE as an IMT-2020 technology
National HIPAA Audioconferences
OMES General Safety Risk Management
Scenario Discussion.
Computer System Security
Presentation transcript:

Scott & Scott, LLPPage 1 Business Impact of a Data Breach Research Sponsored by Scott & Scott, LLP Julie Machal-Fulks May 23, 2007

Scott & Scott, LLPPage 2 Survey Topics Are organizations prepared to respond to breaches and what remedial actions do they consider the most important? Do organizations measure the cost related to breaches? What causes data breaches? How have breaches affected organizations’ strategies for preventing breaches? Are there differences in the way pre-breach and post- breach organizations approach prevention and detection of data breaches?

Scott & Scott, LLPPage 3 The sample of 702 IT security practitioners Sample responseFreq.Pct% Total sampling frame % invitations sent % Bounce back8977.6% Total surveys received7806.6% Rejected surveys780.7% Final sample7026.0%

Scott & Scott, LLPPage 4 85% of respondents’ companies experienced a breach or security incident

Scott & Scott, LLPPage 5 42% of data breaches were caused by missing devices such as laptop computers

Scott & Scott, LLPPage 6 Are organizations failing to employ remedial measures to reduce the risk of future breaches?

Scott & Scott, LLPPage 7 57% did not have an incident response plan in place when the breach happened

Scott & Scott, LLPPage 8 Typical immediate response: prompt notification by letter

Scott & Scott, LLPPage 9 81% of respondents have not calculated costs associated with breaches

Scott & Scott, LLPPage 10 Notification strategy: 37% notify everyone, regardless of potential harm

Scott & Scott, LLPPage 11 Majority of respondents do not believe that breach victims suffer monetary damages

Scott & Scott, LLPPage 12 Is management supportive of efforts to prevent data breaches?

Scott & Scott, LLPPage 13 Breaches may impact spending on IT security

Scott & Scott, LLPPage 14 Breaches may change expectations about IT spending

Scott & Scott, LLPPage 15 Questions? Robert J. Scott Julie Machal-Fulks Scott & Scott, LLP 2200 Ross Avenue, Suite 5350E Dallas, Texas