FINANCIER DATA PROTECTION & PRIVACY LAWS ANNUAL REVIEW ONLINE CONTENT DECEMBER 2016 R E P R I N T F I N A N C I E R W O R L D W I D E.

Size: px
Start display at page:

Download "FINANCIER DATA PROTECTION & PRIVACY LAWS ANNUAL REVIEW ONLINE CONTENT DECEMBER 2016 R E P R I N T F I N A N C I E R W O R L D W I D E."

Transcription

1 R E P R I N T F I N A N C I E R W O R L D W I D E. C O M ANNUAL REVIEW DATA PROTECTION & PRIVACY LAWS REPRINTED FROM ONLINE CONTENT DECEMBER Financier Worldwide Limited Permission to use this reprint has been granted by the publisher PREPARED ON BEHALF OF FINANCIER WORLDWIDE corporatefinanceintelligence

2 UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Q IN YOUR EXPERIENCE, DO COMPANIES IN THE US PAY ENOUGH ATTENTION TO THE RISKS ASSOCIATED WITH DATA PROTECTION? ARE THEY BEGINNING TO FULLY UNDERSTAND THEIR DUTIES OF CONFIDENTIALITY AND PRIVACY IN THE DIGITAL AGE? FRIEL: With electronic data an important and valuable asset and data collection, exploitation and sharing becoming increasingly pervasive, organisations are becoming increasingly aware that they should review legal and self-regulatory requirements whenever they are involved in consumer or employee data collection, use, processing, storage or transfer or in transactions where data assets or activities are involved. In addition, consumer data privacy and security issues, including many high profile security breaches, have recently spawned consumer class action and shareholder derivative lawsuits involving various tort and unfair business practices theories, the viability of which are not yet settled. The Securities and Exchange Commission and boards of directors have taken note, and oversight of information management governance and preparedness at the board and C-suite level are becoming the norm. Some of the liability risks may be covered by insurance and the number of companies taking such coverage has increased, though as the law in this area continues to evolve, so do insurers exclusions and specialty policies. Q COULD YOU OUTLINE THE LATEST LEGAL AND REGULATORY DEVELOPMENTS AFFECTING CORPORATE STORAGE, HANDLING AND TRANSFER OF DATA IN THE US? FRIEL: The US lacks an omnibus data protection regime. Instead, data privacy and security requirements reside in a variety of different federal and state laws. Federal laws take a sectoral approach, regulating particular industries, such as healthcare, or issues including children s privacy. Some state laws are more comprehensive and frequently set a higher compliance standard. There are also various self-regulatory programmes regarding data privacy protection that apply to various industries and practices, such as interestbased advertising. Even for companies not in highly regulated industries, like healthcare and financial services, the Federal Trade Commission (FTC), which has jurisdiction over the vast majority of commercial enterprises under Section 5 of the FTC Act which prohibits deceptive and unfair business practices, requires accurate disclosure of material data privacy practices and encourages data subject choice. Section 5 of the FTC also requires companies to maintain reasonable data security safeguards. REPRINT FINANCIER WORLDWIDE DECEMBER 2016

3 UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Q IN WHAT WAYS HAVE THE AUTHORITIES INCREASED THEIR MONITORING AND ENFORCEMENT ACTIVITIES WITH RESPECT TO DATA PROTECTION AND PRIVACY IN RECENT YEARS? FRIEL: Of the approximately 300 data breach incidents we have seen in the last year alone, 24 percent resulted in regulatory investigations or inquiries and 6 percent resulted in litigation. The Department of Health and Human Services Office for Civil Rights (OCR) initiated an investigation of incidents involving more than 500 individuals in nearly 100 percent of the HIPAA health record related breaches we saw, but rarely for incidents involving fewer data subjects. Of more than 100 OCR investigations, only two resulted in finalised resolution agreements. Certain state attorneys general (AGs) have also been active in investigating breaches. AGs initiated investigations in 36 percent of our non-healthcare incidents and 26 percent of the healthcare incidents. Regulatory enforcement regarding lack of adequate security following a breach is also likely to continue. As for privacy, the FTC is the most active regulator, using its Section 5 deception authority to go after inaccurate privacy promises. Q WHAT INSIGHTS CAN WE DRAW FROM RECENT HIGH- PROFILE DATA BREACHES? WHAT IMPACT HAVE THESE SITUATIONS HAD ON THE DATA PROTECTION LANDSCAPE? FRIEL: Based on our experience of data breaches in 2015, the industries affected were 23 percent healthcare, 18 percent financial services, 16 percent education, 12 percent retail, 9 percent restaurant and hospitality, 6 percent government, 6 percent insurance, 2 percent professional services and 8 percent others. This mix tends to reflect the sensitivity and value of the data collected and used by these respective industries. Of these, 63 percent were private, 14 percent public, 7 percent non-profit and 16 percent other, which could suggest that private companies have less secure data than public and government entities. In terms of company size, 8 percent had revenue greater than $5bn, 32 percent between $1bn and $5bn, 9 percent from $501m to $1bn, 17 percent in the $151m to $500m range, 9 percent between $50m and $150m and 25 percent less than $50m. This shows that data incidents affect companies of all sizes. DECEMBER 2016 FINANCIER WORLDWIDE REPRINT 8

4 UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Organisations need a contingency plan in place to prepare for near-inevitable compliance failures and security breaches. Q THE USE OF THIRD PARTIES, SUCH AS CONSULTANTS, AGENTS AND DISTRIBUTERS, EXPOSES FIRMS TO UNIQUE DATA PROTECTION RISKS. WHAT ARE SOME OF THESE RISKS AND WHAT STEPS CAN BE TAKEN TO MITIGATE THEM? FRIEL: In 2015, 14 percent of the security incidents we saw were the result of vendors. Where there are specific data security legal obligations in the US, vendor data security diligence, management and compliance is required. The same is included in all government and industry guidance on what constitutes a reasonable data security programmes. Privacy and data ownership and use issues are becoming of greater concern as big data uses such as for analytics, cross-device consumer matching, market intelligence and dynamic pricing evolve. When engaging vendors, companies need to clarify in the contract who, as between the parties, owns the data, what the vendor can use it for and under what circumstances, for example, the use of aggregate or de-identified data, not attributable to the company or its data subjects permitted for the vendor s own use, the security and breach response responsibilities, cyber risk insurance obligations, and the application of indemnity, and liability limitations, on confidentiality, privacy and security violations. Q WHAT CAN COMPANIES DO TO MANAGE INTERNAL DATA PRIVACY RISKS AND THREATS, SUCH AS LIABILITIES ARISING FROM LOST DEVICES OR THE ACTIONS OF ROGUE EMPLOYEES? FRIEL: Companies need to develop robust information management programmes which provide a framework for managing an organisation s data and which consider the protection of that data. Effective programmes need to take an enterprise-wide approach and set policies and procedures according to the business value of the information. That value is based on business considerations as well as legal and regulatory requirements and attendant risk. Programmes are most effective when they reflect the input of all relevant stakeholders, including business units, legal, privacy, compliance, IT and IS. A sound programme should also be adaptable to regulatory changes. Programmes should be built on an operational lifecycle approach where the aim is to assess, protect, sustain and respond with the cycle constantly repeating. Programmes should be managed in a way that there is accountability, and should establish goals and measure performance. REPRINT FINANCIER WORLDWIDE DECEMBER 2016

5 UNITED STATES ALAN L. FRIEL BAKERHOSTETLER Q WHAT ADVICE CAN YOU OFFER TO COMPANIES IN THE US ON MANAGING DATA RISK, INSTALLING INTERNAL COMPLIANCE PROCESSES AND MAINTAINING COMPLIANCE ON DATA PRIVACY GOING FORWARD? FRIEL: Consistent with FTC guidance, we recommend that organisations appoint a senior level executive to specifically keep abreast of the development of the law in this area and to work to institute an information management programme that combines information governance policies and procedures and addresses data privacy and security issues as products, services, methodologies and practices are developed, rather than addressing them as an afterthought when making changes to comply with law or to minimise risk, which may be more difficult and costly. Compliance programmes should include an assessment of an organisation s data collection, processing, use, storage and transfer practices to ensure that its privacy and security policies are accurate and sufficient. The organisation s practices, and those of its vendors, should be monitored to ensure compliance with those policies. Ongoing impact assessments should also be applied to new products and practices. Finally, organisations need a contingency plan in place to prepare for near-inevitable compliance failures and security breaches. Alan L. Friel Partner BakerHostetler +1 (310) afriel@bakerlaw.com Alan Friel is a partner in BakerHostetler s Los Angeles office where he coordinates the firm s advertising, retailing, and e-commerce industry initiative and is a member of its privacy and data security, and content, platforms and software teams. He is also an adjunct professor at UCLA and Loyola Marymount Law Schools, and was named one of the most influential lawyers in Digital Media and ecommerce Law by the Los Angeles Business Journal. DECEMBER 2016 FINANCIER WORLDWIDE REPRINT

6 FW S U P P L E M E N T A N N U A L R E V I E W

Preparing for California's New Privacy Law Will Make for a Busy 2019 for Legal, IT and Info Governance Departments

Preparing for California's New Privacy Law Will Make for a Busy 2019 for Legal, IT and Info Governance Departments Preparing for California's New Privacy Law Will Make for a Busy 2019 for Legal, IT and Info Governance Departments Overview of the CCPA BY Alan Friel BakerHostetler California has enacted, effective Jan.

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

ARE YOU HIP WITH HIPAA?

ARE YOU HIP WITH HIPAA? ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined

More information

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know 1801 California Street Suite 4900 Denver, CO 80202 303-830-1776 Facsimile 303-894-9239 MEMORANDUM To: Adam Finkel, Assistant Director, Government Relations, NCRA From: Mel Gates Date: December 23, 2013

More information

FRAMEWORK FOR CONSUMER PRIVACY LEGISLATION

FRAMEWORK FOR CONSUMER PRIVACY LEGISLATION FRAMEWORK FOR CONSUMER PRIVACY LEGISLATION OBJECTIVES This framework is a call to action: The United States should adopt a national privacy law that protects consumers by expanding their current rights

More information

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment

More information

Cybersecurity Curveballs in Vendor Risk Management Programs

Cybersecurity Curveballs in Vendor Risk Management Programs Cybersecurity Curveballs in Vendor Programs 2016 SoCal Cybersecurity, & Data Protection Retreat November 7, 2016 2016 Reed Smith LLP. All rights reserved. The contents of this presentation are for informational

More information

How to mitigate risks, liabilities and costs of data breach of health information by third parties

How to mitigate risks, liabilities and costs of data breach of health information by third parties How to mitigate risks, liabilities and costs of data breach of health information by third parties April 17, 2012 ID Experts Webinar www.idexpertscorp.com Rick Kam President and Co-Founder richard.kam@idexpertscorp.com

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

Blockchain. Technologies. Team Overview. Seyfarth Shaw Blockchain Technologies 1

Blockchain. Technologies. Team Overview. Seyfarth Shaw Blockchain Technologies 1 Blockchain Technologies Team Overview Seyfarth Shaw Blockchain Technologies 1 By the Numbers 11 40+ 84 % Our Blockchain Technologies team comprises attorneys across 11 practice areas including Corporate,

More information

HEALTHCARE BREACH TRIAGE

HEALTHCARE BREACH TRIAGE IAPP Privacy Academy September 30 October 2, 2013 HEALTHCARE BREACH TRIAGE Theodore P. Augustinos EDWARDS WILDMAN PALMER LLP Kenneth P. Mortensen CVS/CAREMARK 2013 Edwards Wildman Palmer LLP & Edwards

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

It s as AWESOME as You Think It Is!

It s as AWESOME as You Think It Is! It s as AWESOME as You Think It Is! Fine Print This presentation and any materials and/or comments are training and educational in nature only. They do not establish an attorney-client relationship, are

More information

Be Careful What You Wish For: The Final Rule Is Out

Be Careful What You Wish For: The Final Rule Is Out Be Careful What You Wish For: The Final Rule Is Out Theodore J. Kobus III tkobus@bakerlaw.com @tedkobus 212.271.1504 Lynn Sessions lsessions@bakerlaw.com @lynnsessions 713.646.1352 Toll Free 24-Hour Data

More information

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel HIPAA Training HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel Agenda HIPAA basics HITECH highlights Questions and discussion HIPAA Basics Legal Basics Health Insurance Portability

More information

HIPAA Security How secure and compliant are you from this 5 letter word?

HIPAA Security How secure and compliant are you from this 5 letter word? HIPAA Security How secure and compliant are you from this 5 letter word? January 29, 2014 www.prnadvisors.com 1 1 About me Over 20 Years in IT as hand-on leader Implemented EMR s of all sizes for Hospitals,

More information

HIPAA and Lawyers: Your stakes have just been raised

HIPAA and Lawyers: Your stakes have just been raised HIPAA and Lawyers: Your stakes have just been raised October 16, 2013 Presented by: Harry Nelson e: hnelson@fentonnelson.com Claire Marblestone e: cmarblestone@fentonnelson.com AGENDA Statutory & Regulatory

More information

A Special Type of Government Scrutiny: Pharmaceutical Manufacturer Relationships with Specialty Pharmacies: Part II

A Special Type of Government Scrutiny: Pharmaceutical Manufacturer Relationships with Specialty Pharmacies: Part II April 2017 Follow @Paul_Hastings A Special Type of Government Scrutiny: Pharmaceutical Manufacturer Relationships with Specialty Pharmacies: Part II By Gary F. Giampetruzzi & Jonathan Stevens Reproduced

More information

Fraud risk management. Oil and gas sector

Fraud risk management. Oil and gas sector Fraud risk management Oil and gas sector Fraud risk management oil and gas sector Contents Why should you be concerned about fraud risks? 1 Key risks in the oil and gas sector 2 Five key factors your business

More information

Anticipating the Burden of Risk:

Anticipating the Burden of Risk: Anticipating the Burden of Risk: Breach Notification Compliance International risk assessment This Bloomberg Law report provides an assessment of the international risk landscape surrounding breach notification

More information

Determining Whether You Are a Business Associate

Determining Whether You Are a Business Associate The HIPAApotamus in the Room: When Lawyers and Law Firms are Subject to HIPAA Enforcement, And How to Comply with the Law by Leslie R. Isaacman, J.D., M.B.A. The Omnibus Final Rule 1 of the Health Information

More information

RIMS Cyber Presentation

RIMS Cyber Presentation RIMS Cyber Presentation Forrest Pace Cyber & Strategic Risk Leader South Zone AIG Property Casualty Forrest.Pace@aig.com 1 Bio Forrest Pace is the Cyber and Strategic Risk Leader for the South Zone, coordinating

More information

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia HIPAA in the Digital Age Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia Virginia MGMA reminds attendees that the program is not intended to provide legal advice and advises participants

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

Allianz Global Corporate & Specialty Pacific. Allianz Cyber Protect Premium

Allianz Global Corporate & Specialty Pacific. Allianz Cyber Protect Premium Allianz Global Corporate & Specialty Pacific Allianz Cyber Protect Premium Contents Allianz Cyber Protect Premium... 3 Comprehensive protection for your business... 3 What is the full impact of a cyber

More information

Navigating the New Federal and State Debt Collection Enforcement Landscape Presented by Venable LLP Speakers:

Navigating the New Federal and State Debt Collection Enforcement Landscape Presented by Venable LLP Speakers: Navigating the New Federal and State Debt Collection Enforcement Landscape Presented by Venable LLP Speakers: Jonathan L. Pompan, Esq. Kevin L. Turner, Esq. Alexandra Megaris, Esq. Andrew E. Bigart, Esq.

More information

Emerging legal and regulatory risks

Emerging legal and regulatory risks Emerging legal and regulatory risks Presentation for AusCERT2016 Matthew Pokarier and Ben Di Marco Structure Regulatory risks Third-party liability Actions by affected individuals Actions by banks and

More information

Building a Program to Manage the Vendor Management Lifecycle

Building a Program to Manage the Vendor Management Lifecycle Building a Program to Manage the Vendor Management Lifecycle Libbie Canter Amelia Hukoveh Daniel Nazar October 5, 2017 Overview 1. Introduction and Background 2. Three Pillars of Third-Party Risk Management

More information

T A B L E of C O N T E N T S

T A B L E of C O N T E N T S INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

AMA Practice Management Center, What you need to know about the new health privacy and security requirements 1. HIPAA Security Rule Johns, Merida L., Information Security, in Johns, Merida L. (ed.) Health Information Management Technology, an Applied Approach, AHIMA: Chicago, IL, 2nd ed. 2007, chapter 19, pp.

More information

THE ETHICS OF OUTSOURCING LEGAL SERVICES

THE ETHICS OF OUTSOURCING LEGAL SERVICES THE ETHICS OF OUTSOURCING LEGAL SERVICES FRAMEWORK FOR THINKING ABOUT LEGAL OUTSOURCING Value Capacity Efficiency Cost Savings Predictability Innovation Peace of Mind Quality People Process Technology

More information

Title CIHI Submission: 2014 Prescribed Entity Review

Title CIHI Submission: 2014 Prescribed Entity Review Title CIHI Submission: 2014 Prescribed Entity Review Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated health

More information

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: UPDATE 2015 February 20, 2015 I. Executive Summary HIPAA is a federal law passed by Congress to protect medical patient data privacy from misuse or disclosure

More information

"HIPAA RULES AND COMPLIANCE"

HIPAA RULES AND COMPLIANCE PRESENTER'S GUIDE "HIPAA RULES AND COMPLIANCE" Training for HIPAA REGULATIONS Quality Safety and Health Products, for Today...and Tomorrow OUTLINE OF MAJOR PROGRAM POINTS OUTLINE OF MAJOR PROGRAM POINTS

More information

Healthcare Data Breaches: Handle with Care.

Healthcare Data Breaches: Handle with Care. Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice

More information

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996.

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996. What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996. HIPAA stands for Health Insurance Portability and Accountability

More information

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

NOTIFICATION OF PRIVACY AND SECURITY BREACHES NOTIFICATION OF PRIVACY AND SECURITY BREACHES Overview The UT Health Science Center at San Antonio (Health Science Center) is required to report all breaches of protected health information and personally

More information

Negotiating Business Associate Agreements

Negotiating Business Associate Agreements Negotiating Business Associate Agreements February 19, 2015 William J. Roberts, Esq. Shipman & Goodwin LLP 2015. All rights reserved. HARTFORD STAMFORD GREENWICH WASHINGTON, DC About HIPAA HIPAA is a federal

More information

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION THIS AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION ( PHI ) ( Agreement ) is entered into between The Moses H. Cone Memorial Hospital Operating

More information

Cyber Insurance 2017:

Cyber Insurance 2017: Cyber Insurance 2017: Ensuring Your Coverage is Sound Thursday, March 23, 2017 Attorney Advertising Prior results do not guarantee a similar outcome 777 East Wisconsin Avenue, Milwaukee, WI 53202 414.271.2400

More information

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule HIPAA THE NEW RULES Highlights of the major changes under the Omnibus Rule AUTHOR Gamelah Palagonia, Founder CIPM, CIPP/IT, CIPP/US, CIPP/G, ARM, RPLU+ PRIVACY PROFESSIONALS LLC gpalagonia@privacyprofessionals.com

More information

ADVANCED CONTRACT LAW

ADVANCED CONTRACT LAW Organised By: Supported By: ADVANCED CONTRACT LAW Friday, 25th January 2019 9AM - 3PM 6 Battery Road, #10-01, Singapore 049909 Modern day contracting methods in today's business landscape have adopted

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber Protection Data Creates Duties What data do you access, and

More information

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile

More information

Omnibus Rule: HIPAA 2.0 for Law Firms

Omnibus Rule: HIPAA 2.0 for Law Firms Omnibus Rule: HIPAA 2.0 for Law Firms Introduction On January 25, 2013, the U.S. Department of Health and Human Services (HHS) issued the muchanticipated Omnibus Rule 1 finalizing changes to the HIPAA

More information

Amadeus Global Report 2016 A business, financial and sustainability overview. Corporate risk management

Amadeus Global Report 2016 A business, financial and sustainability overview. Corporate risk management A business, financial and sustainability overview 11 Corporate risk management 126 Amadeus Global Report 2016 11. Corporate risk management In 2015, with the endorsement of the Board of Directors and the

More information

HIPAA and ProAssurance

HIPAA and ProAssurance HIPAA and ProAssurance The ProAssurance Companies, along with our legal counsel, have reviewed the Health Insurance Portability And Accountability Act of 1996, and its implementing regulations (collectively,

More information

HIPAA Enforcement Under the HITECH Act; The Gloves Come Off

HIPAA Enforcement Under the HITECH Act; The Gloves Come Off HIPAA Enforcement Under the HITECH Act; The Gloves Come Off Leeann Habte, Esq. Michael Scarano, Esq. December 6, 2011 Attorney Advertising Prior results do not guarantee a similar outcome Models used are

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

Beyond the General Data Protection Regulation (GDPR)

Beyond the General Data Protection Regulation (GDPR) Beyond the General Data Protection Regulation (GDPR) Data residency insights in private healthcare from around the world Learn More To read the full report, please visit us at www.mcafee.com/beyondgdpr

More information

Pension Scheme Cyber Resilence Workshop

Pension Scheme Cyber Resilence Workshop Pension Scheme Cyber Resilence Workshop Cyber Resilience Workshop Pension schemes hold substantial amounts of personal data, have regular financial transactions, and are managed by trustees who often

More information

How we manage risk. Risk philosophy. Risk policy. Risk framework

How we manage risk. Risk philosophy. Risk policy. Risk framework How we manage risk Risk management is integral to the daily operations of our businesses. As a multinational group with activities in over 130 countries, Naspers is exposed to a wide range of risks that

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE January 3, I. Executive Summary.

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE January 3, I. Executive Summary. HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE 2017 January 3, 2017 I. Executive Summary. The Health Insurance Portability and Accountability Act ( HIPAA ) is

More information

Alternative Investments Advisory Services. kpmg.com

Alternative Investments Advisory Services. kpmg.com Alternative Investments Advisory Services kpmg.com Alternative investment opportunities are in great demand as investors seek out consistent, riskadjusted returns. But great demand for your business often

More information

Redesign of DC plans focuses on building the right oversight process moving forward.

Redesign of DC plans focuses on building the right oversight process moving forward. 2016 DEFINED CONTRIBUTION OUTLOOK Redesign of DC plans focuses on building the right oversight process moving forward. NOVEMBER 2016 This summary is part three of a three-part plan sponsor research series

More information

Cyber Enhancement Endorsement

Cyber Enhancement Endorsement Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

SANDHILLS CENTER MH/DD/SAS NOTICE OF PRIVACY PRACTICES

SANDHILLS CENTER MH/DD/SAS NOTICE OF PRIVACY PRACTICES SANDHILLS CENTER MH/DD/SAS NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED & DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION PLEASE REVIEW IT CAREFULLY

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

FEATURE ARTICLE: INVESTING IN TECHNOLOGY COMPANIES

FEATURE ARTICLE: INVESTING IN TECHNOLOGY COMPANIES FEATURE ARTICLE: INVESTING IN TECHNOLOGY COMPANIES Technology companies have always had a place in GIC s portfolio. In recent years, as technology has disrupted traditional industries and spawned new businesses,

More information

HIPAA Privacy and Security Breaches 10 Things To Know

HIPAA Privacy and Security Breaches 10 Things To Know HEALTHCON 2016 HIPAA Privacy and Security Breaches 10 Things To Know Orlando April 11, 2016 Presented by Paul R. Hales, J.D. April 11, 2016 HIPAA Breaches 10 Things To Know presented by Paul R. Hales,

More information

The General Data Protection Regulation s Impact on M&A

The General Data Protection Regulation s Impact on M&A The General Data Protection Regulation s Impact on M&A PRACTICAL ADVICE ON HOW TO CONTINUE A SMOOTH M&A PROCESS Presented by Avi Gesser, Davis Polk partner, Litigation/Cybersecurity Pritesh P. Shah, Davis

More information

Claudia Callaway Christina J. Grigorian

Claudia Callaway Christina J. Grigorian November 17, 2016 Claudia Callaway Christina J. Grigorian Katten Muchin Rosenman LLP Claudia Callaway Partner +1.202.625.3590 claudia.callaway@kattenlaw.com Claudia Callaway is chair of Katten's Consumer

More information

FINANCIER. Q&A: Portfolio valuation SPECIAL REPORT DECEMBER 2015 ISSUE R E P R I N T. REPRINTED FROM

FINANCIER. Q&A: Portfolio valuation SPECIAL REPORT DECEMBER 2015 ISSUE R E P R I N T.  REPRINTED FROM R E P R I N T F I N A N C I E R W O R L D W I D E M A G A Z I N E SPECIAL REPORT Q&A: Portfolio valuation REPRINTED FROM DECEMBER 2015 ISSUE 2015 Financier Worldwide Limited. Permission to use this reprint

More information

Business Associate Contracts: Time Is Running Out...

Business Associate Contracts: Time Is Running Out... Business Associate Contracts: Time Is Running Out... Rebecca L. Williams, RN, JD Partner Seattle, WA beckywilliams@dwt.com 206-628-7769 ... Or April Angst, Again April 2003: First deadline April 14, 2004:

More information

H 7789 S T A T E O F R H O D E I S L A N D

H 7789 S T A T E O F R H O D E I S L A N D ======== LC001 ======== 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO INSURANCE - INSURANCE DATA SECURITY ACT Introduced By: Representatives

More information

HIPAA Compliance Under the Magnifying Glass

HIPAA Compliance Under the Magnifying Glass HIPAA Compliance Under the Magnifying Glass July 30, 2013 Stacy Harper, JD, MHSA, CPC A Webinar Provided by Presenter Stacy Harper Lathrop & Gage, LLP sharper@lathropgage.com 913-451-5125 The information

More information

The American Recovery and Reinvestment Act of 2009: Health Information Privacy and Security Provisions Here We Go Again

The American Recovery and Reinvestment Act of 2009: Health Information Privacy and Security Provisions Here We Go Again ClientAdvisory The American Recovery and Reinvestment Act of 2009: Health Information Privacy and Security Provisions Here We Go Again February 26, 2009 On February 17, 2009, President Obama signed into

More information

Anatomy of a Data Breach

Anatomy of a Data Breach Anatomy of a Data Breach May 17, 2017 Lucie F. Huger Officer, Greensfelder, Hemker & Gale, P.C. Mary Ann Wymore Officer, Greensfelder, Hemker & Gale, P.C. Information is the New Oil! Companies are collecting

More information

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises By David Zetoony Partner, Bryan Cave LLP Courtney Stout Counsel, Davis Wright Tremaine LLP With Contributions By Suzanne Gladle,

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES January 23, 2014 I. Executive Summary I: The HIPAA Final Rule

More information

The Impact of Technology on Nonprofit Governance (and its Regulation)

The Impact of Technology on Nonprofit Governance (and its Regulation) The Impact of Technology on Nonprofit Governance (and its Regulation) Presented to: 2017 NAAG/NASCO Annual Conference October 2, 2017 Washington, D.C. Michael W. Peregrine McDermott Will & Emery LLP MPeregrine@mwe.com

More information

NOTICE OF PRIVACY PRACTICES This Notice is effective March 26, 2013

NOTICE OF PRIVACY PRACTICES This Notice is effective March 26, 2013 Bluebonnet Health Services of Waco 2020 N Valley Mills Dr. Waco, Texas 76712 NOTICE OF PRIVACY PRACTICES This Notice is effective March 26, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU

More information

Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences

Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences 1 Brief discussion of where we have been and where we are going Discussion of Federal Enforcement Actions Privacy and Security issue

More information

RISK FACTORS RISKS RELATING TO PARTICIPATION IN THE TOKEN SALE

RISK FACTORS RISKS RELATING TO PARTICIPATION IN THE TOKEN SALE RISK FACTORS You should carefully consider and evaluate each of the following risk factors and all other information contained in the Terms of Token Sale (the Terms ) before deciding to participate in

More information

UK Motor Insurance Insights: Managing the challenges of digital risk

UK Motor Insurance Insights: Managing the challenges of digital risk REPORT UK Motor Insurance Insights: Managing the challenges of digital risk UK Insurance Underwriting Digitisation Study 2017 JULY 2017 Introduction In January 2017, LexisNexis Risk Solutions released

More information

Hot Topics in Software as a Service and Cloud

Hot Topics in Software as a Service and Cloud Hot Topics in Software as a Service and Cloud Presented by: Robert J. Scott www.scottandscottllp.com Speaker Robert J. Scott Cloud Computing Trends Forrester Research estimates the cloud market will reach

More information

Managing Risks in a Rapidly Changing Landscape series:

Managing Risks in a Rapidly Changing Landscape series: Aon Risk Solutions Specialty Financial & Professional Services Managing Risks in a Rapidly Changing Landscape series: Where are your people? Successfully combining business travel risk management and how

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

W. Reece Hirsch Davis Wright Tremaine LLP (415) (206)

W. Reece Hirsch Davis Wright Tremaine LLP (415) (206) HIPAA Implementation Tips W. Reece Hirsch (415) 276-6514 reecehirsch@dwt.com www.dwt.com Rebecca L. Williams, RN, JD (206) 628-7769 beckywilliams@dwt.com www.dwt.com Use and Disclosure Who is a Business

More information

University Data Policies

University Data Policies BACKGROUND Data are valuable institutional assets of Washington State University. Data policies are needed to ensure that these resources are carefully managed, maintained, protected, and used appropriately.

More information

AppLovin Data Processing Agreement

AppLovin Data Processing Agreement AppLovin Data Processing Agreement This AppLovin Data Processing Agreement ( DPA ) is incorporated into and is subject to the AppLovin Terms of Use Agreement available at https://www.applovin.com/terms

More information

BERMUDA MONETARY AUTHORITY THE INSURANCE CODE OF CONDUCT FEBRUARY 2010

BERMUDA MONETARY AUTHORITY THE INSURANCE CODE OF CONDUCT FEBRUARY 2010 Table of Contents 0. Introduction..2 1. Preliminary...3 2. Proportionality principle...3 3. Corporate governance...4 4. Risk management..9 5. Governance mechanism..17 6. Outsourcing...21 7. Market discipline

More information

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners 2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners Providers, and Partners 2 Editor s Foreword What follows are excerpts from the U.S. Department of Health and

More information

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 The Impact of Final Omnibus HIPAA/HITECH Rules Presented by Eileen Coyne Clark Niki McCoy September 19, 2013 0 Disclaimer The material in this presentation is not meant to be construed as legal advice

More information

Risk Management Policy and Procedures.

Risk Management Policy and Procedures. Risk Management Policy and Procedures. Rev Date Purpose of Issue/Description of Change Date 1. June 2006 Initial Issue 2. November 2009 Revised and updated 6 th November 2009 3. September 2010 Revised

More information

U.S. Private-sector Privacy Certification

U.S. Private-sector Privacy Certification 1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy

More information

HIPAA Background and History

HIPAA Background and History Agenda Jeffery P. Drummond Lawyers as HIPAA Business Associates: Ethical Obligations and Practical Tips for Compliance Dallas Bar Association January 17, 2018 Jamie Sorley An Overview of HIPAA The Privacy

More information

BERNSTEIN. 34 th Annual Strategic Decisions Conference. David Wichmann, CEO May 31, 2018

BERNSTEIN. 34 th Annual Strategic Decisions Conference. David Wichmann, CEO May 31, 2018 BERNSTEIN 34 th Annual Strategic Decisions Conference David Wichmann, CEO May 31, 2018 2018 UnitedHealth Group. All Rights Reserved. UnitedHealth Group is a registered trademark with the U.S. Patent and

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

1 Security 101 for Covered Entities

1 Security 101 for Covered Entities HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

AS PASSED BY HOUSE AND SENATE H Page 1 of 37 H.764. An act relating to data brokers and consumer protection

AS PASSED BY HOUSE AND SENATE H Page 1 of 37 H.764. An act relating to data brokers and consumer protection 2018 Page 1 of 37 H.764 An act relating to data brokers and consumer protection It is hereby enacted by the General Assembly of the State of Vermont: Sec. 1. FINDINGS AND INTENT (a) The General Assembly

More information

UCLA Policy 420: Breaches of Computerized Personal Information

UCLA Policy 420: Breaches of Computerized Personal Information UCLA Policy 420: Breaches of Computerized Personal Information Issuing Officer: Executive Vice Chancellor and Provost Responsible Dept: Information Technology Services Effective Date: May 1, 2012 Supersedes:

More information

HIPAA Security. ible. isions. Requirements, and their implementation. reader has

HIPAA Security. ible. isions. Requirements, and their implementation. reader has HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

How to Choose a Total Chargeback Management Provider

How to Choose a Total Chargeback Management Provider How to Choose a Total Chargeback Management Provider Chargebacks impact all types of merchants physical goods, recurring, digital goods merchants to the tune of $40 billion every year. This problem continues

More information

HITECH/HIPAA Omnibus Final Rule: Implications for Hospices. Elizabeth S. Warren May 3, 2013

HITECH/HIPAA Omnibus Final Rule: Implications for Hospices. Elizabeth S. Warren May 3, 2013 HITECH/HIPAA Omnibus Final Rule: Implications for Hospices Elizabeth S. Warren May 3, 2013 Final Rule is Finally Here Published January 25, 2013 (78 Fed. Reg. 5566) Effective March 26, 2013 Compliance

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, COMMISSION DECISION of pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the Safe

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information