Five Key Steps to Developing an Information Security Program




*Take the Time to Comprehensively Evaluate the Company’s Legal Obligations...3

*Review What You Need to Accomplish...6

*Choose an Information Security Coordinator/Team...7

*Start With What You Have...8

*Evaluate Potential Threats and Adopt Reasonable Security Measures to Combat Them...10

*Appendix A - Massachusetts Identity Theft Laws & Regulations...14

*Appendix B - Federal Red Flags Rules...18

*FTC Guidelines to Compliance with Red Flags Rules...21

*Supplement A to Appendix A...26

*About Foley Hoag LLP...30

*About the Security and Privacy Practice...30

*Gabriel M. Helmer...31

Please see full eBook for more information.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Foley Hoag LLP | Attorney Advertising

Written by:


Foley Hoag LLP on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.