SlideShare a Scribd company logo
1 of 39
MA Privacy Law Overview:  Standards for the Protection of Personal Information of Residents of the Commonwealth Thursday, May 7, 2009 2:00 – 2:50 p.m. EDT
Our Presenters Travis M. Drouin, CPA, CIA   Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting
Scoping the Massachusetts Privacy Law
A Perspective: Identity Theft Facts ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
A Perspective: Identity Theft Facts ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Landmark Breaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
The Origins of the Massachusetts Law ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Defining the Massachusetts Privacy Law 201 CMR 17.00
New Massachusetts Privacy and Data Protection Law ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],New Massachusetts Privacy and Data Protection Law Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],New Massachusetts Privacy and Data Protection Law Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Compliance Dates ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Failure to Comply $$ ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Other Consequences of  Non-Compliance ,[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Becoming Compliant Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Steps to Achieve Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved . Information Process Flow
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the  Organization ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 1:  Assessment of the Organization ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 2:  Encryption & Data Protection ,[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 3:  Assessing 3 rd  Party Vendors, Training Employees & Monitoring Compliance Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 3:  Assessing 3 rd  Party Vendors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 4:  Training Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Step 5:  Monitoring Compliance ,[object Object],[object Object],[object Object],[object Object],Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
Questions for our presenters? Travis M. Drouin, CPA, CIA   Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting

More Related Content

What's hot

Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And KeyYarko Petriw
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityRachel Hamilton
 
California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?Lumension
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspacetimmcguinness
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareNationalUnderwriter
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 

What's hot (20)

201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And Key
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 

Similar to MA Privacy Law

Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawIreneWachsler
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Craig Rispin
 

Similar to MA Privacy Law (20)

Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy Law
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 

More from travismd

Stock Based Compensation
Stock Based CompensationStock Based Compensation
Stock Based Compensationtravismd
 
Social Media Presentation To Spc
Social Media Presentation To SpcSocial Media Presentation To Spc
Social Media Presentation To Spctravismd
 
Preparing For IFRS - An Update
Preparing For IFRS - An UpdatePreparing For IFRS - An Update
Preparing For IFRS - An Updatetravismd
 
FMA of NH May 19, 2009
FMA of NH May 19, 2009FMA of NH May 19, 2009
FMA of NH May 19, 2009travismd
 
The Power of Networking
The Power of NetworkingThe Power of Networking
The Power of Networkingtravismd
 
FMA of NH: Safeguarding Cash
FMA of NH: Safeguarding CashFMA of NH: Safeguarding Cash
FMA of NH: Safeguarding Cashtravismd
 
FMA of NH: Preparing for a Successful Liquidity Event
FMA of NH:  Preparing for a Successful Liquidity EventFMA of NH:  Preparing for a Successful Liquidity Event
FMA of NH: Preparing for a Successful Liquidity Eventtravismd
 
Preparing For IFRS
Preparing For IFRSPreparing For IFRS
Preparing For IFRStravismd
 
Other FASB Updates
Other FASB UpdatesOther FASB Updates
Other FASB Updatestravismd
 
IFRS Perspective
IFRS PerspectiveIFRS Perspective
IFRS Perspectivetravismd
 
J-Sox Perspective
J-Sox PerspectiveJ-Sox Perspective
J-Sox Perspectivetravismd
 

More from travismd (11)

Stock Based Compensation
Stock Based CompensationStock Based Compensation
Stock Based Compensation
 
Social Media Presentation To Spc
Social Media Presentation To SpcSocial Media Presentation To Spc
Social Media Presentation To Spc
 
Preparing For IFRS - An Update
Preparing For IFRS - An UpdatePreparing For IFRS - An Update
Preparing For IFRS - An Update
 
FMA of NH May 19, 2009
FMA of NH May 19, 2009FMA of NH May 19, 2009
FMA of NH May 19, 2009
 
The Power of Networking
The Power of NetworkingThe Power of Networking
The Power of Networking
 
FMA of NH: Safeguarding Cash
FMA of NH: Safeguarding CashFMA of NH: Safeguarding Cash
FMA of NH: Safeguarding Cash
 
FMA of NH: Preparing for a Successful Liquidity Event
FMA of NH:  Preparing for a Successful Liquidity EventFMA of NH:  Preparing for a Successful Liquidity Event
FMA of NH: Preparing for a Successful Liquidity Event
 
Preparing For IFRS
Preparing For IFRSPreparing For IFRS
Preparing For IFRS
 
Other FASB Updates
Other FASB UpdatesOther FASB Updates
Other FASB Updates
 
IFRS Perspective
IFRS PerspectiveIFRS Perspective
IFRS Perspective
 
J-Sox Perspective
J-Sox PerspectiveJ-Sox Perspective
J-Sox Perspective
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

MA Privacy Law

  • 1. MA Privacy Law Overview: Standards for the Protection of Personal Information of Residents of the Commonwealth Thursday, May 7, 2009 2:00 – 2:50 p.m. EDT
  • 2. Our Presenters Travis M. Drouin, CPA, CIA Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Defining the Massachusetts Privacy Law 201 CMR 17.00
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Becoming Compliant Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 16.
  • 17. Step 1: Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 18.
  • 19.
  • 20. Step 1: Assessment of the Organization Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved . Information Process Flow
  • 21.
  • 22.
  • 23.
  • 24. Step 2: Encryption & Data Protection Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Step 3: Assessing 3 rd Party Vendors, Training Employees & Monitoring Compliance Copyright 2009.  MFA Cornerstone Consulting, LLC.  All Rights Reserved .
  • 36.
  • 37.
  • 38.
  • 39. Questions for our presenters? Travis M. Drouin, CPA, CIA Partner MFA – Moody, Famiglietti & Andronico, LLP Matthew Pettine, CGEIT, CISA, ASE, MCSE, MSCBA Managing Director, IT Advisory Practice MFA Cornerstone Consulting