Basics of Cybersecurity and Data Privacy Incident Response Counseling

09 Sep , 2024

To register for the upcoming live webinar, please Click Here

This course examines data privacy and cybersecurity incidents from a response perspective. The presentation will spotlight three primary components of the incident response lifecycle:

1. Investigation and verification of a breach

2. Breach notification

3. Post-breach remediation

With a focus on state data breach notification statutes, the course explores core questions involving events impacting protected information, such as:

1. What is considered “personal information”?

2. How can personal information become “breached”?

3. What is the risk of harm to personal information following an incident?

When an incident is determined to be a “breach,” organizations often need to take prompt action to ensure compliance with state and federal law. This lecture considers what happens when a “breach” is declared, including notification to impacted individuals. Finally, the course explores common avenues organizations may consider to prevent a breach from happening again in the future, including the development and implementation of cybersecurity training and awareness programs.

Course Objectives:

Identify common types of cybersecurity and data privacy incidents

Explore the concept of personal information

Understand a “breach” as a legal term of art

Identify statutory requirements following a breach, such as incident notification

Understand common methods of post-breach remediation

 

To register for the upcoming live webinar, please Click Here

More Webcasts

Lawyers In Distress ...

I’m ok. I can work this out for myself. I’m not like a “real” alcoholic any...

Establishing Best Pr...

The value of diversity has been researched extensively for its impact on various industries, includi...

Avoiding the Hidden ...

All contracts have them. After the parties carefully negotiate a contract, they often do not even co...

The ‘Revolving Doo...

This CLE will cover the critical ethics issues involved in leaving government practice for the priva...

Document Automation ...

Document automation has been called the #1 technology lawyers need to implement to ensure they don&r...

The National Labor R...

The National Labor Relations Act (NLRA) provides rights and protections to almost all of the private...

The Hatch-Waxman Saf...

This course is designed to inform patent practitioners on the bounds of the Hatch-Waxman Safe Harbor...

Navigating your non-...

A noncitizen’s legal status can present thorny issues you should consider in pursuing your cli...

High-Level Negotiati...

This program will supercharge your practice and your personal life. A lot of programs that deal with...

Non-Competes: What ...

In April 2024, the Federal Trade Commission (FTC) issued a final rule that took the extraordinary st...