This course examines data privacy and cybersecurity incidents from a response perspective. The presentation will spotlight three primary components of the incident response lifecycle:
1. Investigation and verification of a breach
2. Breach notification
3. Post-breach remediation
With a focus on state data breach notification statutes, the course explores core questions involving events impacting protected information, such as:
1. What is considered “personal information”?
2. How can personal information become “breached”?
3. What is the risk of harm to personal information following an incident?
When an incident is determined to be a “breach,” organizations often need to take prompt action to ensure compliance with state and federal law. This lecture considers what happens when a “breach” is declared, including notification to impacted individuals. Finally, the course explores common avenues organizations may consider to prevent a breach from happening again in the future, including the development and implementation of cybersecurity training and awareness programs.
Course Objectives:
• Identify common types of cybersecurity and data privacy incidents
• Explore the concept of personal information
• Understand a “breach” as a legal term of art
• Identify statutory requirements following a breach, such as incident notification
• Understand common methods of post-breach remediation
This CLE will discuss the critical issues relating to the use of social media and legal ethics. The ...
If we stop to think about what we look at most during the day, the answer would probably not be our ...
This Continuing Legal Education presentation covers electronic discovery and the related ethical dut...
Join Attorneys Cynthia Sharp and Rebecca Howlett in this cutting-edge CLE course on implementing Art...
This course is designed to alert patent practitioners with the PTO rules on the “Duty of Discl...
The United States Taxes American taxpayers on worldwide income; for non-U.S. taxpayers, however, the...
Insurance bad faith claims can increase litigation risks for insurers. The claims are often tort rat...
In this program we will discuss all facets of the Medicare Secondary Payer Act (MSP) including: reim...
As any of the recent legal news stories about artificial intelligence clarify, the legal world becom...
This program will put "cutting edge" topics on hold and instead re-center lawyers' attention to the ...