The Cybersecurity and Information Sharing Act (S.754), or CISA, cleared an important hurdle on October 22, 2015 when the Senate voted 83-14 to end debate on several amendments to the bill. CISA creates a cyberthreat...more
Data breaches are crisis moments that business must prepare for in many ways: not just in taking steps at prevention, but also mitigating losses, arranging for business continuity, complying with legal and regulatory...more
10/19/2015
/ Business Continuity Plans ,
Crisis Management ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Privacy ,
Data Protection ,
Data Security ,
Loss Mitigation ,
Popular ,
Public Relations ,
Reputation Management
What makes data privacy law interesting for academics, challenging for lawyers, and frustrating for businesses its shape-shifting structure in the face of rapidly changing technology. The recent change in the invalidation of...more
10/19/2015
/ Administrative Authority ,
Breach Notification Rule ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Privacy ,
Data Protection ,
Data Security ,
EU ,
EU Data Protection Laws ,
Federal Trade Commission (FTC) ,
FTC v Wyndham ,
GLBA Privacy ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Personal Data ,
Popular ,
Unfair or Deceptive Trade Practices ,
US-EU Safe Harbor Framework ,
Wyndham
In This Presentation:
- Overview of data breach landscape
- Data breach response
..Technical best practices
..Legal best practices
- Data breach prevention
..Technical best practices
..Legal best...more