Five Key Steps to Developing an Information Security Program

Foley Hoag LLP
Contact

Contents

*Introduction...1

*Take the Time to Comprehensively Evaluate the Company’s Legal Obligations...3

*Review What You Need to Accomplish...6

*Choose an Information Security Coordinator/Team...7

*Start With What You Have...8

*Evaluate Potential Threats and Adopt Reasonable Security Measures to Combat Them...10

*Appendix A - Massachusetts Identity Theft Laws & Regulations...14

*Appendix B - Federal Red Flags Rules...18

*FTC Guidelines to Compliance with Red Flags Rules...21

*Supplement A to Appendix A...26

*About Foley Hoag LLP...30

*About the Security and Privacy Practice...30

*Gabriel M. Helmer...31

Please see full eBook for more information.

Please see full publication below for more information.

LOADING PDF: If there are any problems, click here to download the file.

Written by:

Foley Hoag LLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Foley Hoag LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide