Contents
*Introduction...1
*Take the Time to Comprehensively Evaluate the Company’s Legal Obligations...3
*Review What You Need to Accomplish...6
*Choose an Information Security Coordinator/Team...7
*Start With What You Have...8
*Evaluate Potential Threats and Adopt Reasonable Security Measures to Combat Them...10
*Appendix A - Massachusetts Identity Theft Laws & Regulations...14
*Appendix B - Federal Red Flags Rules...18
*FTC Guidelines to Compliance with Red Flags Rules...21
*Supplement A to Appendix A...26
*About Foley Hoag LLP...30
*About the Security and Privacy Practice...30
*Gabriel M. Helmer...31
Please see full eBook for more information.
Please see full publication below for more information.