SlideShare une entreprise Scribd logo
1  sur  33
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
2016 Central Ohio InfoSec Summit
Cybersecurity Act of 2015 & Other Hot Privacy and
Cybersecurity Topics
Heather Enlow-Novitsky
henovitsky@vorys.com
614-464-6226
Chris Ingram
clingram@vorys.com
614-464-5480
March 30, 2016
1
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Topics
1) Cybersecurity Act of 2015 – CISA
2) Proposed EU-US Privacy Shield
3) Encryption Wars & Mobile Devices
4) FTC’s Regulation of Unfair Cybersecurity Practices
2
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
3
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Cybersecurity Act of 2015
› Mechanism for sharing cybersecurity information
among private sector and federal entities
› Authorizes entities to monitor certain information
systems and operate defensive measures
› Provides safe harbors for liability
› DHS lead agency to manage sharing
4
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Definitions
› “Cyberthreat indicator”
• Information necessary to describe
or identify -
› Malicious reconnaissance
› Methods for defeating
security or exploiting
vulnerability
› Methods causing a user with
legitimate access to
unwittingly enable security
vulnerability
› Malicious cyber command
and control
› The actual or potential harm
caused
› “Defensive measures”
› Essentially a measure that detects,
prevents, or mitigates a known or
suspected cybersecurity threat or security
vulnerability
› Excludes “a measure that destroys,
renders unusable, provides unauthorized
access to, or substantially harms an
information system or information stored
on, processed by, or transiting such
information system not owned by:
• The private entity operating the measure; or
• Another entity or federal entity that is
authorized to provide consent and has provided
consent to that private entity for operation of
such measure.”
5
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA- Federal Sharing
› Federal agencies to issue procedures within 60 days to allow timely
sharing of cyberthreat indicators and defensive measures:
• Ensure real time sharing among federal agencies
• Incorporate existing processes, roles, and responsibilities (ISACs)
• Include rules and procedures for notifying entities that receive erroneous
information or where information is shared in violation of CISA
• Protect against unauthorized access to shared cyberthreat information
• Require removal of personal or personally identifiable information of
individuals not directly related to cybersecurity threat
6
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA - Nonfederal Sharing
› Authorizes nonfederal entities to share cyberthreat
indicators and defensive measures
› Classified information must be protected
› Must scrub PII not directly related to a cyberthreat prior
to sharing
› DHS was given 90 days to develop a process to accept
real time info. from nonfederal entities and to
automatically share with other federal agencies
7
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA - Use of Information
› Information received under CISA may be disclosed, retained
or used only for:
• Cybersecurity purpose
• Identifying cybersecurity threats or security vulnerabilities
• Responding to, preventing, or mitigating a specific threat of death,
physical or economic harm
• Responding to, investigating, prosecuting, preventing or mitigating a
serious threat to a minor or offense related to above; or
• Offenses relating to fraud, identity theft, espionage, censorship, or the
protection of trade secrets
8
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Safe Harbors for Private Entities
› No civil liability for sharing or receiving cyberthreat
indicators or defensive measures
› Shared information may not be used to regulate,
including in an enforcement action
• Can be used to inform the development of regulations of
information systems relating to the prevention or
mitigation of cybersecurity threats
9
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Safe Harbors for Private Entities
› No antitrust liability for private entities exchanging
cyberthreat indicators or defensive measures
› No waiver of privileges or protection (including
trade secret)
› No duty to share, warn or act, and no liability for not
sharing.
• Federal entities may not require sharing as a condition of
awarding any federal grant or contract
10
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Other Provisions
› Authorizes private entities to monitor and apply defensive
measures to their own information systems and others that
have provided written consent, including information
processed by or transmitted through those systems
• Does not authorize measures that destroy, render unusable, provide
unauthorized access to, or substantially harm an information system or
information not owned by the private entity or consenting entity
› Reporting requirements to Congress
› Broad preemption
› 10 year sunset provision
11
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
CISA – Concerns Remain
› What standard of care will private entities be held to when
scrubbing data?
› Is the immunity given to private entities too broad or is it
insufficient?
› Should the types of information shared be limited?
› Should this be exempt from FOIA?
› Will this enable additional surveillance and/or
investigations unrelated to cybersecurity?
12
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
H.R. 4350 – CISA’s Demise?
13
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Sharing Data From Across the Pond
14
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU – Data Protection Directive
› Enacted in 1995 to protect personal data
• Restricts transfer of Europeans’ personal data to countries
outside of the European Economic Area
• New regulation anticipated this year
› The US Safe Harbor:
• Companies regulated by FTC or Dept. of Transportation
could opt in
• Self-certification process
• Public commitments enforced by FTC
15
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU – Data Protection Directive
› US Safe Harbor invalidated in
October 2015
› Austrian citizen complained
about his personal data on
facebook
› Argued that data is not protected
from surveillance by the
government
• Relied on Edward Snowden’s
allegations about the NSA
16
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Proposed EU-US Privacy Shield
› Proposed framework released Feb. 2, 2016
› Companies regulated by FTC (or other qualifying
federal agency) must:
1. Publicly commit to adhere to the Privacy Principles
2. Disclose privacy policy
3. Implement the Privacy Principles
› Certifications must be renewed annually
17
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Notice –
• Participation in Privacy Shield
• Type of data collected
• Purposes for collection
• Third parties’ use and
disclosure of data
• Available recourse
› Choice –
• Opt out must be clear and
conspicuous
• Opt in required for sensitive
information
› Race/ethnicity
› Political opinions
› Religious beliefs
› Health information
› Trade union membership
› Sexual orientation
18
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Accountability for data transferred to third parties:
• Contracts with third parties must require the third party to
provide same level of privacy protection as the Principles
• Third parties’ use of data must be consistent with users’
consent
• Must take reasonable and appropriate steps to ensure vendors
uphold Principles
• Must be able to cease data transmission to stop and remediate
misuse of data
19
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Security –
• Required to “take reasonable
and appropriate measures” to
protect data from unauthorized
access, loss, disclosure,
alteration or destruction
› Measures taken should be
balanced with the risks
involved in the processing
and the nature of the
personal data
› Data Integrity –
• Limits collection of personal
information to that which is
relevant for the purpose of
processing
• Prohibited from processing
personal information that is
incompatible with the purposes
for which it has been collected
or subsequently authorized by
the individual
20
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield – Principles
› Access –
• Must enable individuals to
correct, amend or delete
inaccurate personal information
unless burden or expense
outweighs risks to the
individual’s privacy
› Recourse, Enforcement and
Liability –
• Individuals must be provided
use of a third party dispute
resolution body, free of charge,
to investigate and resolve
complaints of violations
• Ultimately, disputes can be
resolved through binding
arbitration
• Organization may remain liable
for vendors’ violations unless
the organization proves it was
not at fault
21
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
EU-US Privacy Shield –
Not Approved Yet
› The EU’s representative bodies must still approve
the proposed text
› Recent encryption disputes concerning mobile
devices have threatened EU approval
22
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
23
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
› All Writs Act - 1789
› Permits a court, in its
“sound judgment” to
issue orders necessary
“to achieve the rational
ends of law” and “the
ends of justice entrusted
to it.”
24
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
› “The implications of the
government’s demands are
chilling.”
• Install surveillance software
• Access health records and financial
data
• Track your location
• Access the phone’s microphone or
camera
25
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
› States are considering bans on devices that would ban the
sale of full-disk encryption of smartphones
› California’s bill:
• Purpose – combat human trafficking/San Bernardino
• Scope – any smartphone sold or leased in CA after January 1,
2017
• Penalty – $2,500/phone against manufacturer or operating
system provider
26
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
The Encryption War & Smartphones
Potential hurdles against states’ efforts:
› Dormant Commerce Clause
› Preemption – ENCRYPT Act (H.R. 4528)
“It is clear to me that creating a pathway for decryption only
for good guys is technologically stupid. You just can’t do that”
Rep. Ted Lieu (D-Calif.)
27
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC – Regulation of Unfair Cybersecurity
Practices
› FTC Act prohibits “unfair or deceptive acts or
practices in or affecting commerce.”
› Deception is typically tied to misrepresentations –
e.g., privacy policies
› FTC’s ability to regulate the fairness of
cybersecurity practices was affirmed in August 2015
28
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC v. Wyndham Worldwide Corp.
› More than $10.6 million in fraudulent charges
› Three separate intrusions in two years
• First intrusion – used brute-force to obtain administrator’s
username and password, then installed malware
• Second intrusion – used administrative account and
installed malware again
• Third intrusion – accessed servers that should have been
segmented from the Internet
29
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC v. Wyndham Worldwide Corp.
Alleged Security Flaws
› Payment card data stored in clear text
› Weak passwords/default passwords in environment
› Lacked firewalls at critical points in the network
› Failed to restrict specific IP addresses at all
› Lacked inventory of computers connected to the network
› Did not force security patches to connected computers
› Inadequate information security policies
› Did not limit duration of vendors’ access
› Failed to employ reasonable measures to detect and prevent unauthorized access
› Failed to follow proper incident response procedures – did not learn from prior
intrusions
30
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
FTC – What Are Fair Cybersecurity
Practices?
1) Start with security
2) Control access to data sensibly
3) Require secure passwords/authentication
4) Sensitive personal information should be secured
5) Segment the network and monitor traffic
6) Restrict remote access
7) Apply security practices in product development
8) Manage service providers’ security measures
9) Keep security current
10) Secure media and devices
31
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
Other Regulators Are Joining Cybersecurity
Chorus
1) Securities and Exchange Commission
• Assessing cybersecurity compliance and implementation is top
priority for 2016; recently issued $75,000 fine
2) Federal Communications Commission
• Issued nearly $26 million in fines in 2015 related to data
security practices
3) Consumer Financial Protection Bureau
• March 2, 2016 – levied $100,000 penalty for falsely advertising
that customer information was “safe” and “secure” and “PCI
compliant”
32
© Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.®
2016 Central Ohio InfoSec Summit
Cybersecurity Act of 2015 & Other Hot Privacy and
Cybersecurity Topics
Heather Enlow-Novitsky
henovitsky@vorys.com
614-464-6226
Chris Ingram
clingram@vorys.com
614-464-5480
March 30, 2016
33

Contenu connexe

Tendances

Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedJames '​-- Mckinlay
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Dan Michaluk
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasShawn Tuma
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerIdan Tohami
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 

Tendances (20)

Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 

En vedette

Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Chief Optimist
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar Decisions
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck finalScalar Decisions
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storagepatmisasi
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT InfrastructureScalar Decisions
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsSpredfast
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Scalar Decisions
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overviewpatmisasi
 

En vedette (20)

Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging Brocade
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker Entertainment
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
12210943 pss7
12210943 pss712210943 pss7
12210943 pss7
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
 

Similaire à Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 septRachel Aldighieri
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...Jason Haislmaier
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Robert MacLean
 
Big Data
Big DataBig Data
Big Datacadmef
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your BusinessTrustArc
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 

Similaire à Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics (20)

Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Big Data
Big DataBig Data
Big Data
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 

Plus de centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systemscentralohioissa
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospitalcentralohioissa
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50centralohioissa
 

Plus de centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 

Dernier

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics

  • 1. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® 2016 Central Ohio InfoSec Summit Cybersecurity Act of 2015 & Other Hot Privacy and Cybersecurity Topics Heather Enlow-Novitsky henovitsky@vorys.com 614-464-6226 Chris Ingram clingram@vorys.com 614-464-5480 March 30, 2016 1
  • 2. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Topics 1) Cybersecurity Act of 2015 – CISA 2) Proposed EU-US Privacy Shield 3) Encryption Wars & Mobile Devices 4) FTC’s Regulation of Unfair Cybersecurity Practices 2
  • 3. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® 3
  • 4. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Cybersecurity Act of 2015 › Mechanism for sharing cybersecurity information among private sector and federal entities › Authorizes entities to monitor certain information systems and operate defensive measures › Provides safe harbors for liability › DHS lead agency to manage sharing 4
  • 5. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Definitions › “Cyberthreat indicator” • Information necessary to describe or identify - › Malicious reconnaissance › Methods for defeating security or exploiting vulnerability › Methods causing a user with legitimate access to unwittingly enable security vulnerability › Malicious cyber command and control › The actual or potential harm caused › “Defensive measures” › Essentially a measure that detects, prevents, or mitigates a known or suspected cybersecurity threat or security vulnerability › Excludes “a measure that destroys, renders unusable, provides unauthorized access to, or substantially harms an information system or information stored on, processed by, or transiting such information system not owned by: • The private entity operating the measure; or • Another entity or federal entity that is authorized to provide consent and has provided consent to that private entity for operation of such measure.” 5
  • 6. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA- Federal Sharing › Federal agencies to issue procedures within 60 days to allow timely sharing of cyberthreat indicators and defensive measures: • Ensure real time sharing among federal agencies • Incorporate existing processes, roles, and responsibilities (ISACs) • Include rules and procedures for notifying entities that receive erroneous information or where information is shared in violation of CISA • Protect against unauthorized access to shared cyberthreat information • Require removal of personal or personally identifiable information of individuals not directly related to cybersecurity threat 6
  • 7. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA - Nonfederal Sharing › Authorizes nonfederal entities to share cyberthreat indicators and defensive measures › Classified information must be protected › Must scrub PII not directly related to a cyberthreat prior to sharing › DHS was given 90 days to develop a process to accept real time info. from nonfederal entities and to automatically share with other federal agencies 7
  • 8. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA - Use of Information › Information received under CISA may be disclosed, retained or used only for: • Cybersecurity purpose • Identifying cybersecurity threats or security vulnerabilities • Responding to, preventing, or mitigating a specific threat of death, physical or economic harm • Responding to, investigating, prosecuting, preventing or mitigating a serious threat to a minor or offense related to above; or • Offenses relating to fraud, identity theft, espionage, censorship, or the protection of trade secrets 8
  • 9. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Safe Harbors for Private Entities › No civil liability for sharing or receiving cyberthreat indicators or defensive measures › Shared information may not be used to regulate, including in an enforcement action • Can be used to inform the development of regulations of information systems relating to the prevention or mitigation of cybersecurity threats 9
  • 10. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Safe Harbors for Private Entities › No antitrust liability for private entities exchanging cyberthreat indicators or defensive measures › No waiver of privileges or protection (including trade secret) › No duty to share, warn or act, and no liability for not sharing. • Federal entities may not require sharing as a condition of awarding any federal grant or contract 10
  • 11. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Other Provisions › Authorizes private entities to monitor and apply defensive measures to their own information systems and others that have provided written consent, including information processed by or transmitted through those systems • Does not authorize measures that destroy, render unusable, provide unauthorized access to, or substantially harm an information system or information not owned by the private entity or consenting entity › Reporting requirements to Congress › Broad preemption › 10 year sunset provision 11
  • 12. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® CISA – Concerns Remain › What standard of care will private entities be held to when scrubbing data? › Is the immunity given to private entities too broad or is it insufficient? › Should the types of information shared be limited? › Should this be exempt from FOIA? › Will this enable additional surveillance and/or investigations unrelated to cybersecurity? 12
  • 13. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® H.R. 4350 – CISA’s Demise? 13
  • 14. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Sharing Data From Across the Pond 14
  • 15. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU – Data Protection Directive › Enacted in 1995 to protect personal data • Restricts transfer of Europeans’ personal data to countries outside of the European Economic Area • New regulation anticipated this year › The US Safe Harbor: • Companies regulated by FTC or Dept. of Transportation could opt in • Self-certification process • Public commitments enforced by FTC 15
  • 16. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU – Data Protection Directive › US Safe Harbor invalidated in October 2015 › Austrian citizen complained about his personal data on facebook › Argued that data is not protected from surveillance by the government • Relied on Edward Snowden’s allegations about the NSA 16
  • 17. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Proposed EU-US Privacy Shield › Proposed framework released Feb. 2, 2016 › Companies regulated by FTC (or other qualifying federal agency) must: 1. Publicly commit to adhere to the Privacy Principles 2. Disclose privacy policy 3. Implement the Privacy Principles › Certifications must be renewed annually 17
  • 18. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Notice – • Participation in Privacy Shield • Type of data collected • Purposes for collection • Third parties’ use and disclosure of data • Available recourse › Choice – • Opt out must be clear and conspicuous • Opt in required for sensitive information › Race/ethnicity › Political opinions › Religious beliefs › Health information › Trade union membership › Sexual orientation 18
  • 19. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Accountability for data transferred to third parties: • Contracts with third parties must require the third party to provide same level of privacy protection as the Principles • Third parties’ use of data must be consistent with users’ consent • Must take reasonable and appropriate steps to ensure vendors uphold Principles • Must be able to cease data transmission to stop and remediate misuse of data 19
  • 20. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Security – • Required to “take reasonable and appropriate measures” to protect data from unauthorized access, loss, disclosure, alteration or destruction › Measures taken should be balanced with the risks involved in the processing and the nature of the personal data › Data Integrity – • Limits collection of personal information to that which is relevant for the purpose of processing • Prohibited from processing personal information that is incompatible with the purposes for which it has been collected or subsequently authorized by the individual 20
  • 21. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Principles › Access – • Must enable individuals to correct, amend or delete inaccurate personal information unless burden or expense outweighs risks to the individual’s privacy › Recourse, Enforcement and Liability – • Individuals must be provided use of a third party dispute resolution body, free of charge, to investigate and resolve complaints of violations • Ultimately, disputes can be resolved through binding arbitration • Organization may remain liable for vendors’ violations unless the organization proves it was not at fault 21
  • 22. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® EU-US Privacy Shield – Not Approved Yet › The EU’s representative bodies must still approve the proposed text › Recent encryption disputes concerning mobile devices have threatened EU approval 22
  • 23. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones 23
  • 24. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones › All Writs Act - 1789 › Permits a court, in its “sound judgment” to issue orders necessary “to achieve the rational ends of law” and “the ends of justice entrusted to it.” 24
  • 25. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones › “The implications of the government’s demands are chilling.” • Install surveillance software • Access health records and financial data • Track your location • Access the phone’s microphone or camera 25
  • 26. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones › States are considering bans on devices that would ban the sale of full-disk encryption of smartphones › California’s bill: • Purpose – combat human trafficking/San Bernardino • Scope – any smartphone sold or leased in CA after January 1, 2017 • Penalty – $2,500/phone against manufacturer or operating system provider 26
  • 27. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® The Encryption War & Smartphones Potential hurdles against states’ efforts: › Dormant Commerce Clause › Preemption – ENCRYPT Act (H.R. 4528) “It is clear to me that creating a pathway for decryption only for good guys is technologically stupid. You just can’t do that” Rep. Ted Lieu (D-Calif.) 27
  • 28. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC – Regulation of Unfair Cybersecurity Practices › FTC Act prohibits “unfair or deceptive acts or practices in or affecting commerce.” › Deception is typically tied to misrepresentations – e.g., privacy policies › FTC’s ability to regulate the fairness of cybersecurity practices was affirmed in August 2015 28
  • 29. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC v. Wyndham Worldwide Corp. › More than $10.6 million in fraudulent charges › Three separate intrusions in two years • First intrusion – used brute-force to obtain administrator’s username and password, then installed malware • Second intrusion – used administrative account and installed malware again • Third intrusion – accessed servers that should have been segmented from the Internet 29
  • 30. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC v. Wyndham Worldwide Corp. Alleged Security Flaws › Payment card data stored in clear text › Weak passwords/default passwords in environment › Lacked firewalls at critical points in the network › Failed to restrict specific IP addresses at all › Lacked inventory of computers connected to the network › Did not force security patches to connected computers › Inadequate information security policies › Did not limit duration of vendors’ access › Failed to employ reasonable measures to detect and prevent unauthorized access › Failed to follow proper incident response procedures – did not learn from prior intrusions 30
  • 31. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® FTC – What Are Fair Cybersecurity Practices? 1) Start with security 2) Control access to data sensibly 3) Require secure passwords/authentication 4) Sensitive personal information should be secured 5) Segment the network and monitor traffic 6) Restrict remote access 7) Apply security practices in product development 8) Manage service providers’ security measures 9) Keep security current 10) Secure media and devices 31
  • 32. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® Other Regulators Are Joining Cybersecurity Chorus 1) Securities and Exchange Commission • Assessing cybersecurity compliance and implementation is top priority for 2016; recently issued $75,000 fine 2) Federal Communications Commission • Issued nearly $26 million in fines in 2015 related to data security practices 3) Consumer Financial Protection Bureau • March 2, 2016 – levied $100,000 penalty for falsely advertising that customer information was “safe” and “secure” and “PCI compliant” 32
  • 33. © Copyright 2016, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers.® 2016 Central Ohio InfoSec Summit Cybersecurity Act of 2015 & Other Hot Privacy and Cybersecurity Topics Heather Enlow-Novitsky henovitsky@vorys.com 614-464-6226 Chris Ingram clingram@vorys.com 614-464-5480 March 30, 2016 33