Yes. You’re in the right room.. Hi! I’m David (Hi David!)

Slides:



Advertisements
Similar presentations
A GIA is a contract between a surety company and a contractor (or subcontractor)/principal. A GIA is a standard, typical document in the construction.
Advertisements

THE ROLE OF INSURANCE REQUIREMENTS WITHIN AN ORGANIZATION By Aaron Hardiman, MBA, ARM.
© 2012 McNees Wallace & Nurick LLC CONTRACT ESSENTIALS Diane M. Tokarsky Chair, Construction Law 100 Pine Street, PO Box 1166 Harrisburg, PA
Let’s Study Legal English Together!
Basics of Insurance Law PLI: Bridge the Gap II Robert H. Friedman May 26, 2005 Robert H. Friedman May 26,
Waiver of Liability. Purpose The main intent of the Waiver of Liability statement is to highlight the very small yet real risk that volunteer activities.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
Topics Changes Risk Assessments Cloud Data Security / Data Protection Licenses, Copies, Instances Limits of Liability and Indemnification Requests for.
CARLIN LAW GROUP, APC (619) Know Your Indemnity Obligation Know Your Risk Know Your Insurance Company by KEVIN R. CARLIN, ESQ.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Risk Management Contract Basics Beth Carmichael Risk Manager, Five Colleges Inc Wednesday, June 14, Connecticut Conference of Independent Colleges.
Ontario School Boards’ Insurance Exchange “Indemnifying Agreements, Hold Harmless – When Should They Be Used?” November 6, 2008.
Managing Risk in Academic Placement Agreements Joseph C. Risser, CPCU, ARM-P Director, Risk Management California Polytechnic State University.
Exposure to Loss  What are we doing? (What is the increased exposure?)  What do we get out of it? (Is it worth it?)  What is the likelihood of.
Design Lease Contracting for Services IT/Security Medical IGA Special Events Providing Services.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 37 Agency Twomey Jennings Anderson’s Business Law and the Legal.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Burnslev.com © 2013 Burns & Levinson LLP Allocating and Mitigating Contractual Risk ACC – NE Corporate Counsel Institute June 12, 2013 Alan M. Block, John.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Legal Aspects for Research Administrators. LEGAL ASPECTS FOR RESEARCH ADMINISTRATORS Mark Bohnhorst Associate General Counsel* * These materials are informational.
Duty to Defend Often linked with Indemnification Duty to defend kicks in when event occurs Who controls defense 0.
Data Protection Overview
Evaluating the Impact of Heightened Enforcement of Anti- Corruption Legislation Around the World on your D&O Policies; Experience to Date, What Coverages.
Construction Contracts What You Need to Know March 19, 2015.
Middleware Promises Warranties that Don’t Indemnities that Won’t Stephen Rubin, Esquire
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Contract Models for Virtual Teaching Helsinki University Porthania III 24 October 2001 Kristiina Harenko Attorneys at Law Borenius & Kemppinen Oy.
Presented by David P. Schack, Partner June 29, 2006 Insurance Coverage For Multi- State Investigations: Can You Get Your Insurer to Pay for.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Dino Tsibouris (614) Vendor Contracts: What You Need and What You May Be Missing.
July 18, U.S.C. 103(c) as Amended by the Cooperative Research and Technology Enhancement (CREATE) Act (Public Law ) Enacted December 10,
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
Data Protection Act AS Module Heathcote Ch. 12.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA Privacy Rules: What Are Plan Sponsors Required to Do?
Sheri Swain, Director of Enterprise Risk Management Maricopa County Community College District Christine Nobles, Insurance Manager Maricopa County.
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
For Oracle employees and authorized partners only. Do not distribute to third parties. © 2008 Oracle Corporation – Proprietary and Confidential.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Agency and Employment Relationships.
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
Hot Topics in Business Law Panel 1: Negotiating Contract Issues for in-House Counsel.
Key Legal Considerations for Agencies Wake Forest Business School Charlotte Campus June 12, 2013.
JEFFREY L. HUNTER SR RISK ANALYST County of Riverside Human Resource Dept. Risk Management Div. Insurance Requirements In Contracts.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
HOW TO PROTECT YOUR INTEREST IN A SALE CONTRACT Focus on what you “get” when you sign!
The Law Offices of Sheila Deselich Cohen. Generally subject to the Employee Retirement Income Security Act of 1974 (“ERISA”). Two main types of plans:
Presented by: Tommy Mays, Legal Counsel Baptist Health Medical Center Health Contracting 101.
INDEMNITY The University of Texas System Office of General Counsel Dana Hollingsworth, Attorney.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
Contracts A contract is an agreement between two or more parties which creates an obligation to do or not to do a particular thing. The document containing.
Troublesome Contract Clauses College of Liberal Arts
Surveillance around the world
Protection of CONSUMER information
DEALINGS WITH CONTRACTS AND INDEMNIFICATIONS
AGENCY FORMATION AND TERMINATION
PERSONAL DATA PROTECTION ACT 2010
Cyber Issues Facing Medical Practice Managers
Speaker: Sarah Chambers, Esq. Claims Counsel| Professional Liability
AGREEMENT NOT TO COMPETE ….
Find the Problems with the Provisions May 11, 2016 Presented By:
© 2013 Sri U-Thong Limited. All rights reserved
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Yes. You’re in the right room.

Hi!

I’m David (Hi David!)

I’m a lawyer.

Today we’re going to talk about:

Major laws Legal guide Contract issues Toolkit Roadmap

Major laws Computer Fraud and Abuse Act - 18 USC 1030 Wiretapping – 18 USC 2511 Stored Communications Act ( ) – 18 USC 2701 Destruction of communication devices – 18 USC 1362 Patriot Act – amends many laws RICO Foreign Intelligence Surveillance Act (FISA) Medical Computer Crime Act State laws

Major laws KnowledgeExceeding authorityInfrastructure that is not public / openDisclosure / retention of data

Major laws CFAA – up to 20 yearsSCA – 5 years in the absence of maliceWiretapping – 5 years

Major laws Penalty considerations Potential and actual loss Sophistication and planning involved Purpose of offense Intent Impact on privacy rights National security Interference with critical infrastructure Threat to public health

Legal guide ScopePermissionThird partiesAccess

Legal guide Scope What is the customer trying to protect? Systems to be protected Limitations on testing Types of information processed

Legal guide Permission Methods to be used Types of customers serviced Categories of information held Data to be retained Data to be purged

Legal guide Third parties Who are customer’s third party vendors? Does customer contract allow testing? Will you use third parties? Consider law enforcement and prosecutorial priories

Access Document data to which you have access Limit the number of employees who have access to data Create and implement access policies Require written notice Legal issues

Contract PermissionScope of accessIndemnificationTermination issues

Contract Permission and Scope of Access Customer grants Company full and unlimited access to the information and systems set out on the Statement of Work (Access). Access is only limited by the express statements set out in the Statement of Work. Company agrees to keep complete and accurate records of its activities related to Access. Company shall be entitled to produce these records should it be alleged that Company has exceeded the Access authorized by Customer. You must have express permission

Indemnification Customer hereby releases and agrees to indemnify and defend Company, and any and all directors, officers, employees, contractors and agents of Indemnitee (collectively, the “Indemnitees”) from and against any and all liabilities, claims, losses, damages, costs, and expenses, including reasonable attorneys’ fees arising out of or in any way relating to the activities set out on the Statement of Work. This indemnification obligation shall extend to claims brought by customers of Customer and any third party claiming injury of any sort from the activities set out in the Statement of Work. In addition, the indemnification obligation shall extent to any charges brought against Company by a law enforcement or regulatory entity of any type based on the activities contemplated in this Agreement. Contract Indemnification must be broad and extend to end users / law enforcement

Termination Contract Upon termination or expiration of this Agreement, Company shall delete all data and provide Customer with written confirmation of this deletion. Company shall also instruct any entities who have had access to the data to also delete it and provide Customer with written certification of this deletion. The security obligations set out in this Agreement relating to the data shall survive termination or expiration of this Agreement until such time as the data is completely deleted by Company. Company shall require this provision, or one similarly protective of Customer’s rights in all its contracts with suppliers or other vendors who provide aspects of the Services. Company may keep copies of data created pursuant to this Agreement, subject to this paragraph When agreement terminates, your rights terminate.

Toolkit Determine how services will be usedEvaluate customer’s data structure Understand end user’s data Determine the type of data you may retainHigh risk regulatory areasDisposition of data on termination

surveymonkey/source12

Thanks for coming! W:dsnead.com