SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Data Security Breach
Knowing the legal risks and protecting your
business
17 March 2016
Paula Barrett
Partner & Head of Privacy & Information
Law
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
Paula Barrett
Partner
Paula is the international head of our privacy and
information law group.
With a strong background in information technology law,
Paula has developed extensive experience in data
protection/privacy law domestically and internationally.
She is currently advising on data protection compliance
issues in 80+ countries around the world and both Paula
and our data protection practice are independently
highly ranked by Chambers for their expertise.
Paula's recent experience includes advising clients on:
− their data security breach reporting obligations in the
UK and internationally, including representing clients
in their communications with the ICO and other
regulators
− successfully defending clients in response to proposed
enforcement action by the ICO
− the privacy issues arising from proposed
implementation of cloud computing solutions including
consideration of Patriot Act, ITAR and similar issues
− international data transfers in the wake of the CJEU
Safe Harbor Case, including intra-group and vendor
transfer arrangements
− the data protection compliance steps required to
implement centralised HR and CRM systems and
shared service centres globally in EMEA, North &
South America and Asia-Pacific
− the privacy issues associated with international
investigations including deployment of ethics reporting
hotline and other reporting tools
− on privacy terms for several medical devices
companies for use with clinicians, hospitals and their
patients
− rollout of data loss prevention and workplace
monitoring
− development of apps platforms
− data analytics on and offline
In Chambers, Paula’s clients report that she "cuts
through the issues - she tells you what you need to
know, the options and how to get there." .
− Data Security Contexts
− Current law
− Changes under EU GDPR proposals
− DLP and other data security tools
Agenda
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
Cyber Security
Eversheds LLP |
Where to Start?
Understand the Risks
Prevention
Dealing with Incident
Eversheds LLP | 21/03/2016 |
Eversheds LLP |
− Financial information
− Sensitive Personal Data
− Personal Data e.g. customer and staff information
− Intellectual Property
− Other corporate information
Types of Asset to be protected
21/03/2016 |
Eversheds LLP |
Legal
Obligations/Risks Data Protection
Sector specific
(e.g. financial
services – Prin 3)
Corporate Duties?
Directors Duties Contractual
Confidentiality (to
others) Negligence
Health & Safety Others?
Understanding Legal Risks
21/03/2016 |
Eversheds LLP |
− Recent global survey by Symantec: Half of employees who left or
lost their jobs in the last 12 months kept confidential corporate
data
• 40% plan to use it at their new job
− Top 5 sectors experiencing insider theft or IP, according to the
CERT Insider Threat Center:
• Information Technology (35%)
• Banking and Finance (12%)
• Chemical (11%)
• Critical Manufacturing(10%)
• Commercial Facilities (8%)
Insider Threats
21/03/2016 |
Eversheds LLP |
Cases in Europe
“this attack was highly complex and conducted with inside
knowledge of our most secure internal systems.“
Mobile Operator Germany – insider data theft, two million customers affected
“leaks exposed flaws in firm’s user software” and “over 400GB of
data released”
Italian cyber consultancy – employees suspected by police over leaked
company secrets
“Supermarket IT auditor bore grudge over disciplinary
misunderstanding”
UK retail chain – former employee leaks 100,000-record payroll
database
21/03/2016 |
Eversheds LLP |
Information
Security?
Compliance?
Legal?
Board?
HR?
marketing
& comms?
finance?
There is a myth that data security
can be addressed solely by IT
In order to succeed you need
partnerships with:
− Management
− Information Security
− Information Technology
− Physical Security
− Legal
− Human Resources
Whose role/responsibility?
21/03/2016 |
Current Data Security Law
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− Accidental loss, damage or destruction and also against
− Processing that is unauthorised or unlawful
− Required level depends on:
• nature of data
• harm that might result having regard to:
• “state of technological development”
• “cost of implementing”
There is no “one size fits all” solution – ICO
“Appropriate” measures against personal data’s:
Seventh Data Protection Principle and its Interpretation
(DPA 1998)
Current UK security requirements
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− Organisational as well as technical measures
• (including “taking reasonable steps to ensure the reliability
of any employees … who have access to personal data”)
− Where processing carried out by a Data Processor
• obtain from DP “sufficient guarantees” of their security measures
• take “reasonable steps” to ensure DP complies with the Act
• DP processing to be under written contract with Data Controller
• terms must include DP only acting on DC’s instructions…
• …and must impose on DP requirements at least as strict as the
Act
Specific points where the Act offers detail:
Seventh Data Protection Principle and its Interpretation
(DPA 1998)
Current UK security requirements
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
“The security measures that are appropriate for an organisation will depend on its
circumstances” “We cannot provide a complete guide to all aspects of security in all
circumstances”
− encryption:
• “The ICO recommends that portable and mobile devices ... used to store and
transmit personal information, … should be protected using approved encryption
software”
• “There have been a number of reports of laptop computers, containing personal
information which have been stolen … without being protected adequately. The ICO
has formed the view that in future, … where encryption … has not been used …
regulatory action may be pursued.”
• new guidance published March 2016
− security breach reporting - ICO seeks to be notified of all “serious breaches”
“Serious” not defined. ICO suggest assessment of:
data volume, sensitivity and the potential detriment to data subjects
Generally ‘case by case’, but guidance on some points
ICO Guidance
Current UK security requirements
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− Apply to: “service providers”
• e.g. telecoms and internet service providers (excludes “content services” providers)
− Trigger: “personal data breaches”
• defined broadly; no threshold for seriousness
− Notifying the ICO
• within 24hrs (Notification Regulation, Art 2(2))
• if full information not available, initial notification and further info within 3 days (&
then 2 weeks)
− Notifying any users likely to be adversely affected
− Keeping a log of breaches
• sufficient for ICO to verify PECR compliance – including
• facts surrounding each breach, effects and remedial action taken
Privacy and Electronic Communications Regulations 2003
(PECR)
Current UK security breach reporting requirements
Requirements:
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− Some prescriptive levels of detail
• e.g. Poland, Israel – requirements for security policies to cover various prescribed
areas, which must then be complied with, Germany, Italy and Spain specific
controls to be addressed in processor contracts
− Higher standards
• e.g. Germany – references to state of the art encryption technology (compare UK
‘having regard to cost’, and to overall appropriateness given likely harm), Spain
and Italy
− Approaches to breach reporting:
• uncommon to find statutory obligation to proactively report– exists in Germany but
only for sensitive personal data
• ‘implied reporting’: Spain – Security Document must be open for DPA inspection
• Netherlands – new mandatory reporting law 2016
EU approach broadly consistent, but:
Selected departures from the UK approach
Current requirements in other jurisdictions
Data Security under GDPR
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− General Data Protection Regulation (“GDPR”) still awaiting final adoption – likely in force from mid 2018
− New security rules apply to controller AND processor
− Appropriate technical and organisational measures to ensure a level of security appropriate to the risk including as
appropriate
• pseudonymisation and encryption
• ability to ensure ongoing confidentiality, integrity, availability and resilience of systems and services
• ability to restore availability and access in a timely manner in the vent of a technical or physical incident
• process for regularly testing, assessing and evaluating the effectiveness
− Regard to be had to state of the art and costs of implementation, nature, scope, context and purposes of processing as
well as the risk of varying likelihood and severity for rights and freedoms
− Regard to be had to risks presented by data processing, in particular from accidental or unlawful destruction, loss,
alteration, unauthorised disclosure, access to data transmitted, stored or processed
− Adoption of codes/certification mechanisms can be used to evidence compliance
− Controller and processor to take steps to prevent any person acting under their authority from processing except under
instruction unless required by law
− Controls on appointment of subprocessors and processor obligations to flow down GDPR responsibilities to subprocessors
− Security links to wider accountability, record keeping, privacy by design and other aspects of GDPR
Heightened Security Responsibilities
GDPR Data Security Standards
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− Controller reporting both to relevant Authority within 72 hours of awareness
• unless unlikely to result in a risk for rights and freedoms of individuals
− Controller reporting to Data Subject without undue delay is likely to result
in a high risk to the rights and freedoms of individuals
• some exceptions apply e.g. if encryption used to render the data
unintelligible
• steps taken so that high risk no longer likely to materialise
− Processor reporting to controller without undue delay
− Prescribed detail for notification of content
− All breaches to be documented
Mandatory Reporting
GDPR Data Security Breach Reporting
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− Fines – breach of data security obligation falls within the 2% turnover threshold (liability for breach of other
provisions up to 4%)
− Damages – greater potential exposure for both controller and processors
− Contracts
• relationship between processors and controllers will change
• pre-contract due diligence for both?
• controls over data changes and ongoing adequacy assessment?
• terms and schedules will likely become more detailed
• Eversheds Cloud Survey – over 50% walked away because of data terms
− Other developments
• EU Network and Information Security Directive –agreement announced 2015 but final version yet to be
published
• the main thrust will be creating national and union security plans and reporting and sharing of
information between member states
• scope of application to “market operators” keenly awaited
• alongside traditional utilities those involved in various forms of communications service provision may
also be designated as “market operators”
• the detail on the level of security and reporting obligations on those market operators (such as the
social platforms and search engines etc) is likely to have been varied in the final version
GDPR Consequences
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
Spotlight on the
− Over 30% of purchaser respondents stated concern over where data is
hosted and/or accessed from, or lack of information about that, triggered
them walking away
− Top 3 issues for walk away cited as data related from purchasers
− http://www.eversheds.com/global/en/what/sectors/tmt/spotlight-on-the-
cloud/index.page
Spotlight on the Cloud Survey 2016
Eversheds LLP |
Know what
to do
Cyber/Data
Incident
Response Team
identified?
Internal
notification
processes (NB
communications
may be down)
Rehearsal?
Disaster
Recovery Plan
Business
Continuity Plan
Investigate
Fact
finding/investiga
tion – what type
of data, volume,
timing
Identify the
vulnerability
Remove ongoing
threat
Use of legal
privilege
Notices
Notifying
individuals or
third parties
whose data is
affected
Notifying
regulators,
police or other
bodies of attack
Listed businesses – market
announcement required?
Notifying shareholders
under Listing principles?
Price Sensitive
information/ insider
notification?
Ongoing
communications
Dealing
with
incident
IP protection
strategy – cease
and desist,
injunctions etc
Recovery of
monies stolen
Cyber extortion Lessons learnt
If an incident arises – have a Plan A…
21/03/2016 |
Data Loss Prevention Tools
Eversheds LLP |
Can you monitor
employees in
compliance with the
applicable
employment, labor
and data protection
laws?
Monitoring to protect; pitfalls await
21/03/2016 |
Eversheds LLP |
Multiple “privacy” Dimensions
Privacy Laws
Employment &
Labour Law
Human Rights
Convention
Communications
Law
Harmonisation Gaps Widen on International Roll-Out
21/03/2016 |
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
− Data Security is a concern across all business sectors
− Not just about “cyber” but also threats from within
− Legal landscape on data risk is changing globally
− Data security standards are increasing through guidance and cases
− Future changes ahead under proposed General Data Protection Regulation with
deepen and widen responsibilities for data security
− Contracting arrangements between controllers and processors are likely to
change over the coming months as the new laws are anticipated
− Preparation for responding to current rules and for future law changes is
important
− Data security breaches should form part of current crisis management plans
− Care is needed when looking at the tools you may deploy to provide security
protection to ensure that you don’t inadvertently create other compliance issues
Summary
Main topics considered
Eversheds LLP |
Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 |
Paula Barrett
Partner at Eversheds
PaulaBarrett@eversheds.com
Connect with me on LinkedIn: In/Paula-Barrett
Connect on Twitter: @PrivacyGlobal
Visit Privacy and Data Protection at www.eversheds.com
Keep in touch
Eversheds LLP |
eversheds.com
©2015 Eversheds LLP
Eversheds LLP is a limited liability partnership
eversheds.com
©2015 Eversheds LLP
Eversheds LLP is a limited liability partnership
For more information
contact:
Paula Barrett
Head of International Privacy
& Information Law
email:
paulabarrett@eversheds.com

Weitere ähnliche Inhalte

Was ist angesagt?

EU Safe Harbor – What Now?
EU Safe Harbor – What Now?EU Safe Harbor – What Now?
EU Safe Harbor – What Now?TrustArc
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset ManagementDonal O'Connell
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Data privacy impact assessment
Data privacy impact assessmentData privacy impact assessment
Data privacy impact assessmentStephen Owen
 
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...Marek Pietrzyk
 
Privacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access RequestsPrivacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access RequestsPeppe Santoro
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_lawbsookman
 
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive AnalyticsPreventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive AnalyticsCapgemini
 
Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery, Inc.
 
CASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterCASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterB2B Marketing
 
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...NICSA
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
RegTech Markets Directory 2017 insights
RegTech Markets Directory 2017 insightsRegTech Markets Directory 2017 insights
RegTech Markets Directory 2017 insightsJason Boud
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation MorningstarLaw
 

Was ist angesagt? (19)

EU Safe Harbor – What Now?
EU Safe Harbor – What Now?EU Safe Harbor – What Now?
EU Safe Harbor – What Now?
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset Management
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Data privacy impact assessment
Data privacy impact assessmentData privacy impact assessment
Data privacy impact assessment
 
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
 
Privacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access RequestsPrivacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access Requests
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_law
 
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive AnalyticsPreventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
 
Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016
 
CASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterCASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disaster
 
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Pdf lachow anu
Pdf lachow anuPdf lachow anu
Pdf lachow anu
 
10 reasons businesses fail!
10 reasons businesses fail!10 reasons businesses fail!
10 reasons businesses fail!
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
RegTech Markets Directory 2017 insights
RegTech Markets Directory 2017 insightsRegTech Markets Directory 2017 insights
RegTech Markets Directory 2017 insights
 
Challenges and Opportunities for SMPs
Challenges and Opportunities for SMPsChallenges and Opportunities for SMPs
Challenges and Opportunities for SMPs
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation
 

Andere mochten auch

Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
The Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human RightsThe Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human RightsEversheds Sutherland
 
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...DATAVERSITY
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
 
Cyber security training for Non-IT Staff
Cyber security training for Non-IT StaffCyber security training for Non-IT Staff
Cyber security training for Non-IT StaffRajneesh G
 
Rethinking the Business Benefits of The Cloud
Rethinking the Business Benefits of The CloudRethinking the Business Benefits of The Cloud
Rethinking the Business Benefits of The CloudMicrosoft Azure
 
10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-MonthsBlue Trumpet Group
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security BreachAlienVault
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
 
Opportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforceOpportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforceEversheds Sutherland
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?Edge Pereira
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
 

Andere mochten auch (20)

Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
The Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human RightsThe Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human Rights
 
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
Cyber security training for Non-IT Staff
Cyber security training for Non-IT StaffCyber security training for Non-IT Staff
Cyber security training for Non-IT Staff
 
30 September 2014: Cyber Security Model
30 September 2014: Cyber Security Model30 September 2014: Cyber Security Model
30 September 2014: Cyber Security Model
 
Rethinking the Business Benefits of The Cloud
Rethinking the Business Benefits of The CloudRethinking the Business Benefits of The Cloud
Rethinking the Business Benefits of The Cloud
 
10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months10 Ways to Guarantee At Data Security Breach in 12-Months
10 Ways to Guarantee At Data Security Breach in 12-Months
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Opportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforceOpportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforce
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 

Ähnlich wie Data Security Breach – knowing the risks and protecting your business

EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)Napier University
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Amazon Web Services
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associatesMohsin Termezy
 
WP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devsWP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devsTiia Rantanen
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data ProtectionLee Schlenker
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 

Ähnlich wie Data Security Breach – knowing the risks and protecting your business (20)

EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
WP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devsWP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devs
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 

Mehr von Eversheds Sutherland

Conduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial SectorConduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial SectorEversheds Sutherland
 
How technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientHow technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientEversheds Sutherland
 
Preparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contractsPreparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contractsEversheds Sutherland
 
State Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risksState Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risksEversheds Sutherland
 
Getting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate OpportunitiesGetting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate OpportunitiesEversheds Sutherland
 
State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016Eversheds Sutherland
 
Is your intellectual property at risk?
Is your intellectual property at risk?Is your intellectual property at risk?
Is your intellectual property at risk?Eversheds Sutherland
 
Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?Eversheds Sutherland
 
Eversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structuresEversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structuresEversheds Sutherland
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthEversheds Sutherland
 
Talent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your teamTalent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your teamEversheds Sutherland
 
Streamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trendsStreamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trendsEversheds Sutherland
 
One Belt One Road in China - 19 November 2015
One Belt One Road in China - 19 November 2015One Belt One Road in China - 19 November 2015
One Belt One Road in China - 19 November 2015Eversheds Sutherland
 
Iran and the JCPOA: Convergence to divergence
Iran and the JCPOA: Convergence to divergenceIran and the JCPOA: Convergence to divergence
Iran and the JCPOA: Convergence to divergenceEversheds Sutherland
 

Mehr von Eversheds Sutherland (20)

The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
Conduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial SectorConduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial Sector
 
Navigating the Insurance Act
Navigating the Insurance ActNavigating the Insurance Act
Navigating the Insurance Act
 
How technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientHow technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficient
 
Preparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contractsPreparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contracts
 
State Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risksState Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risks
 
Post Brexit Update
Post Brexit UpdatePost Brexit Update
Post Brexit Update
 
Getting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate OpportunitiesGetting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
 
Metrics for In-House Teams
Metrics for In-House TeamsMetrics for In-House Teams
Metrics for In-House Teams
 
State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016
 
Is your intellectual property at risk?
Is your intellectual property at risk?Is your intellectual property at risk?
Is your intellectual property at risk?
 
Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?
 
Eversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structuresEversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structures
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worth
 
Bribery and Corruption Campaign
Bribery and Corruption CampaignBribery and Corruption Campaign
Bribery and Corruption Campaign
 
Talent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your teamTalent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your team
 
Tapered annual allowance_webinar
Tapered annual allowance_webinarTapered annual allowance_webinar
Tapered annual allowance_webinar
 
Streamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trendsStreamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trends
 
One Belt One Road in China - 19 November 2015
One Belt One Road in China - 19 November 2015One Belt One Road in China - 19 November 2015
One Belt One Road in China - 19 November 2015
 
Iran and the JCPOA: Convergence to divergence
Iran and the JCPOA: Convergence to divergenceIran and the JCPOA: Convergence to divergence
Iran and the JCPOA: Convergence to divergence
 

Kürzlich hochgeladen

Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | DelhiFULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhisoniya singh
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 

Kürzlich hochgeladen (20)

Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | DelhiFULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Data Security Breach – knowing the risks and protecting your business

  • 1. Data Security Breach Knowing the legal risks and protecting your business 17 March 2016 Paula Barrett Partner & Head of Privacy & Information Law
  • 2. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | Paula Barrett Partner Paula is the international head of our privacy and information law group. With a strong background in information technology law, Paula has developed extensive experience in data protection/privacy law domestically and internationally. She is currently advising on data protection compliance issues in 80+ countries around the world and both Paula and our data protection practice are independently highly ranked by Chambers for their expertise. Paula's recent experience includes advising clients on: − their data security breach reporting obligations in the UK and internationally, including representing clients in their communications with the ICO and other regulators − successfully defending clients in response to proposed enforcement action by the ICO − the privacy issues arising from proposed implementation of cloud computing solutions including consideration of Patriot Act, ITAR and similar issues − international data transfers in the wake of the CJEU Safe Harbor Case, including intra-group and vendor transfer arrangements − the data protection compliance steps required to implement centralised HR and CRM systems and shared service centres globally in EMEA, North & South America and Asia-Pacific − the privacy issues associated with international investigations including deployment of ethics reporting hotline and other reporting tools − on privacy terms for several medical devices companies for use with clinicians, hospitals and their patients − rollout of data loss prevention and workplace monitoring − development of apps platforms − data analytics on and offline In Chambers, Paula’s clients report that she "cuts through the issues - she tells you what you need to know, the options and how to get there." .
  • 3. − Data Security Contexts − Current law − Changes under EU GDPR proposals − DLP and other data security tools Agenda
  • 4. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | Cyber Security
  • 5. Eversheds LLP | Where to Start? Understand the Risks Prevention Dealing with Incident Eversheds LLP | 21/03/2016 |
  • 6. Eversheds LLP | − Financial information − Sensitive Personal Data − Personal Data e.g. customer and staff information − Intellectual Property − Other corporate information Types of Asset to be protected 21/03/2016 |
  • 7. Eversheds LLP | Legal Obligations/Risks Data Protection Sector specific (e.g. financial services – Prin 3) Corporate Duties? Directors Duties Contractual Confidentiality (to others) Negligence Health & Safety Others? Understanding Legal Risks 21/03/2016 |
  • 8. Eversheds LLP | − Recent global survey by Symantec: Half of employees who left or lost their jobs in the last 12 months kept confidential corporate data • 40% plan to use it at their new job − Top 5 sectors experiencing insider theft or IP, according to the CERT Insider Threat Center: • Information Technology (35%) • Banking and Finance (12%) • Chemical (11%) • Critical Manufacturing(10%) • Commercial Facilities (8%) Insider Threats 21/03/2016 |
  • 9. Eversheds LLP | Cases in Europe “this attack was highly complex and conducted with inside knowledge of our most secure internal systems.“ Mobile Operator Germany – insider data theft, two million customers affected “leaks exposed flaws in firm’s user software” and “over 400GB of data released” Italian cyber consultancy – employees suspected by police over leaked company secrets “Supermarket IT auditor bore grudge over disciplinary misunderstanding” UK retail chain – former employee leaks 100,000-record payroll database 21/03/2016 |
  • 10. Eversheds LLP | Information Security? Compliance? Legal? Board? HR? marketing & comms? finance? There is a myth that data security can be addressed solely by IT In order to succeed you need partnerships with: − Management − Information Security − Information Technology − Physical Security − Legal − Human Resources Whose role/responsibility? 21/03/2016 |
  • 12. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − Accidental loss, damage or destruction and also against − Processing that is unauthorised or unlawful − Required level depends on: • nature of data • harm that might result having regard to: • “state of technological development” • “cost of implementing” There is no “one size fits all” solution – ICO “Appropriate” measures against personal data’s: Seventh Data Protection Principle and its Interpretation (DPA 1998) Current UK security requirements
  • 13. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − Organisational as well as technical measures • (including “taking reasonable steps to ensure the reliability of any employees … who have access to personal data”) − Where processing carried out by a Data Processor • obtain from DP “sufficient guarantees” of their security measures • take “reasonable steps” to ensure DP complies with the Act • DP processing to be under written contract with Data Controller • terms must include DP only acting on DC’s instructions… • …and must impose on DP requirements at least as strict as the Act Specific points where the Act offers detail: Seventh Data Protection Principle and its Interpretation (DPA 1998) Current UK security requirements
  • 14. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | “The security measures that are appropriate for an organisation will depend on its circumstances” “We cannot provide a complete guide to all aspects of security in all circumstances” − encryption: • “The ICO recommends that portable and mobile devices ... used to store and transmit personal information, … should be protected using approved encryption software” • “There have been a number of reports of laptop computers, containing personal information which have been stolen … without being protected adequately. The ICO has formed the view that in future, … where encryption … has not been used … regulatory action may be pursued.” • new guidance published March 2016 − security breach reporting - ICO seeks to be notified of all “serious breaches” “Serious” not defined. ICO suggest assessment of: data volume, sensitivity and the potential detriment to data subjects Generally ‘case by case’, but guidance on some points ICO Guidance Current UK security requirements
  • 15. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − Apply to: “service providers” • e.g. telecoms and internet service providers (excludes “content services” providers) − Trigger: “personal data breaches” • defined broadly; no threshold for seriousness − Notifying the ICO • within 24hrs (Notification Regulation, Art 2(2)) • if full information not available, initial notification and further info within 3 days (& then 2 weeks) − Notifying any users likely to be adversely affected − Keeping a log of breaches • sufficient for ICO to verify PECR compliance – including • facts surrounding each breach, effects and remedial action taken Privacy and Electronic Communications Regulations 2003 (PECR) Current UK security breach reporting requirements Requirements:
  • 16. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − Some prescriptive levels of detail • e.g. Poland, Israel – requirements for security policies to cover various prescribed areas, which must then be complied with, Germany, Italy and Spain specific controls to be addressed in processor contracts − Higher standards • e.g. Germany – references to state of the art encryption technology (compare UK ‘having regard to cost’, and to overall appropriateness given likely harm), Spain and Italy − Approaches to breach reporting: • uncommon to find statutory obligation to proactively report– exists in Germany but only for sensitive personal data • ‘implied reporting’: Spain – Security Document must be open for DPA inspection • Netherlands – new mandatory reporting law 2016 EU approach broadly consistent, but: Selected departures from the UK approach Current requirements in other jurisdictions
  • 18. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − General Data Protection Regulation (“GDPR”) still awaiting final adoption – likely in force from mid 2018 − New security rules apply to controller AND processor − Appropriate technical and organisational measures to ensure a level of security appropriate to the risk including as appropriate • pseudonymisation and encryption • ability to ensure ongoing confidentiality, integrity, availability and resilience of systems and services • ability to restore availability and access in a timely manner in the vent of a technical or physical incident • process for regularly testing, assessing and evaluating the effectiveness − Regard to be had to state of the art and costs of implementation, nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for rights and freedoms − Regard to be had to risks presented by data processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure, access to data transmitted, stored or processed − Adoption of codes/certification mechanisms can be used to evidence compliance − Controller and processor to take steps to prevent any person acting under their authority from processing except under instruction unless required by law − Controls on appointment of subprocessors and processor obligations to flow down GDPR responsibilities to subprocessors − Security links to wider accountability, record keeping, privacy by design and other aspects of GDPR Heightened Security Responsibilities GDPR Data Security Standards
  • 19. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − Controller reporting both to relevant Authority within 72 hours of awareness • unless unlikely to result in a risk for rights and freedoms of individuals − Controller reporting to Data Subject without undue delay is likely to result in a high risk to the rights and freedoms of individuals • some exceptions apply e.g. if encryption used to render the data unintelligible • steps taken so that high risk no longer likely to materialise − Processor reporting to controller without undue delay − Prescribed detail for notification of content − All breaches to be documented Mandatory Reporting GDPR Data Security Breach Reporting
  • 20. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − Fines – breach of data security obligation falls within the 2% turnover threshold (liability for breach of other provisions up to 4%) − Damages – greater potential exposure for both controller and processors − Contracts • relationship between processors and controllers will change • pre-contract due diligence for both? • controls over data changes and ongoing adequacy assessment? • terms and schedules will likely become more detailed • Eversheds Cloud Survey – over 50% walked away because of data terms − Other developments • EU Network and Information Security Directive –agreement announced 2015 but final version yet to be published • the main thrust will be creating national and union security plans and reporting and sharing of information between member states • scope of application to “market operators” keenly awaited • alongside traditional utilities those involved in various forms of communications service provision may also be designated as “market operators” • the detail on the level of security and reporting obligations on those market operators (such as the social platforms and search engines etc) is likely to have been varied in the final version GDPR Consequences
  • 21. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | Spotlight on the − Over 30% of purchaser respondents stated concern over where data is hosted and/or accessed from, or lack of information about that, triggered them walking away − Top 3 issues for walk away cited as data related from purchasers − http://www.eversheds.com/global/en/what/sectors/tmt/spotlight-on-the- cloud/index.page Spotlight on the Cloud Survey 2016
  • 22. Eversheds LLP | Know what to do Cyber/Data Incident Response Team identified? Internal notification processes (NB communications may be down) Rehearsal? Disaster Recovery Plan Business Continuity Plan Investigate Fact finding/investiga tion – what type of data, volume, timing Identify the vulnerability Remove ongoing threat Use of legal privilege Notices Notifying individuals or third parties whose data is affected Notifying regulators, police or other bodies of attack Listed businesses – market announcement required? Notifying shareholders under Listing principles? Price Sensitive information/ insider notification? Ongoing communications Dealing with incident IP protection strategy – cease and desist, injunctions etc Recovery of monies stolen Cyber extortion Lessons learnt If an incident arises – have a Plan A… 21/03/2016 |
  • 24. Eversheds LLP | Can you monitor employees in compliance with the applicable employment, labor and data protection laws? Monitoring to protect; pitfalls await 21/03/2016 |
  • 25. Eversheds LLP | Multiple “privacy” Dimensions Privacy Laws Employment & Labour Law Human Rights Convention Communications Law Harmonisation Gaps Widen on International Roll-Out 21/03/2016 |
  • 26. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | − Data Security is a concern across all business sectors − Not just about “cyber” but also threats from within − Legal landscape on data risk is changing globally − Data security standards are increasing through guidance and cases − Future changes ahead under proposed General Data Protection Regulation with deepen and widen responsibilities for data security − Contracting arrangements between controllers and processors are likely to change over the coming months as the new laws are anticipated − Preparation for responding to current rules and for future law changes is important − Data security breaches should form part of current crisis management plans − Care is needed when looking at the tools you may deploy to provide security protection to ensure that you don’t inadvertently create other compliance issues Summary Main topics considered Eversheds LLP |
  • 27. Eversheds LLP | 21/03/2016 |Eversheds LLP | 21/03/2016 | Paula Barrett Partner at Eversheds PaulaBarrett@eversheds.com Connect with me on LinkedIn: In/Paula-Barrett Connect on Twitter: @PrivacyGlobal Visit Privacy and Data Protection at www.eversheds.com Keep in touch Eversheds LLP |
  • 28. eversheds.com ©2015 Eversheds LLP Eversheds LLP is a limited liability partnership eversheds.com ©2015 Eversheds LLP Eversheds LLP is a limited liability partnership For more information contact: Paula Barrett Head of International Privacy & Information Law email: paulabarrett@eversheds.com

Hinweis der Redaktion

  1. Don’t make the mistake of thinking you can navigate through this by reference to the EU directive. Typically you need to work through statute and case laws drawn from each of these quadrants and cultural differences.