This course examines data privacy and cybersecurity incidents from a response perspective. The presentation will spotlight three primary components of the incident response lifecycle:
1. Investigation and verification of a breach
2. Breach notification
3. Post-breach remediation
With a focus on state data breach notification statutes, the course explores core questions involving events impacting protected information, such as:
1. What is considered “personal information”?
2. How can personal information become “breached”?
3. What is the risk of harm to personal information following an incident?
When an incident is determined to be a “breach,” organizations often need to take prompt action to ensure compliance with state and federal law. This lecture considers what happens when a “breach” is declared, including notification to impacted individuals. Finally, the course explores common avenues organizations may consider to prevent a breach from happening again in the future, including the development and implementation of cybersecurity training and awareness programs.
Course Objectives:
• Identify common types of cybersecurity and data privacy incidents
• Explore the concept of personal information
• Understand a “breach” as a legal term of art
• Identify statutory requirements following a breach, such as incident notification
• Understand common methods of post-breach remediation
If we stop to think about what we look at most during the day, the answer would probably not be our ...
Are you confident your nonprofit client is fully compliant and well-governed? During this program yo...
One of the hottest workplace-related buzz words in 2023 was “RIF” (reduction in force). ...
This is a must-attend webinar where we'll explore a comprehensive legal strategy to maximize your cl...
AI is changing everything about the way we deliver legal services. But what is generative AI and how...
Part 3 - Virtually every performance coach will agree that memorized text should be spoken in a way ...
In this program we will discuss all facets of the Medicare Secondary Payer Act (MSP) including: reim...
This course is designed to alert patent practitioners with the PTO rules on the “Duty of Discl...
In today’s complex regulatory environment, a well-crafted privacy policy is crucial for ensuri...
Insurance bad faith claims can increase litigation risks for insurers. The claims are often tort rat...