Exciting new series on “Voice, Body and Movement for Lawyers – How to connect with the jury and find Justice Through Dramatic Technique!”
Click here to find out moreThis course examines data privacy and cybersecurity incidents from a response perspective. The presentation will spotlight three primary components of the incident response lifecycle:
1. Investigation and verification of a breach
2. Breach notification
3. Post-breach remediation
With a focus on state data breach notification statutes, the course explores core questions involving events impacting protected information, such as:
1. What is considered “personal information”?
2. How can personal information become “breached”?
3. What is the risk of harm to personal information following an incident?
When an incident is determined to be a “breach,” organizations often need to take prompt action to ensure compliance with state and federal law. This lecture considers what happens when a “breach” is declared, including notification to impacted individuals. Finally, the course explores common avenues organizations may consider to prevent a breach from happening again in the future, including the development and implementation of cybersecurity training and awareness programs.
Course Objectives:
• Identify common types of cybersecurity and data privacy incidents
• Explore the concept of personal information
• Understand a “breach” as a legal term of art
• Identify statutory requirements following a breach, such as incident notification
• Understand common methods of post-breach remediation
A strong fraud program is essential for protecting financial institutions and their customers from e...
We are among the least diverse industries in the United States. Unconscious bias not only impedes di...
This session provides a practical overview of bank fraud, helping participants identify common fraud...
The Bank Secrecy Act (BSA) is a US law that fights money laundering and other financial crimes. BSA ...
The faculty will discuss when and how secured and unsecured loan transactions may be conducted elect...
This session is designed to help compliance professionals and fintech partners better understand the...
As artificial intelligence tools like ChatGPT become more integrated into our daily lives, it's esse...
This course explores secured transactions involving digital assets as collateral, with a focus on th...
The Electronic Signatures in Global and National Commerce (E-Sign) Act established a legal framework...
The CLE will discuss the role of New York Labor Law Section 201-d in regulating employee conduct ins...