Computer Security Law

Size: px
Start display at page:

Download "Computer Security Law"

Transcription

1 Computer Security Law Seminar Topic: This material provides an in-depth examination of the process and procedure as it relates to computer security law. This material is intended to be a guide in general. As always, if you have any specific question regarding the state of the law in any particular jurisdiction, we recommend that you seek legal guidance relating to your particular fact situation. The course materials will provide the attendee with the knowledge and tools necessary to identify the current legal trends with respect to these issues. The course materials are designed to provide the attendee with current law, impending issues and future trends that can be applied in practical situations. Page 1

2 Copyright 2013 Printed in the United States of America. All rights reserved. No part of this monograph may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, except for citation within legal documents filed with a tribunal, without permission in writing from the publisher. Disclaimer: The views expressed herein are not a legal opinion. Every fact situation is different and the reader is encouraged to seek legal advice for their particular situation. The Apex Jurist, is Published by ApexCLE, Inc South Emerson St., Suite 248 Mount Prospect, Illinois Toll Free South Spring Street Springfield, Illinois Toll Free Ordering Information: Copies of this monograph may be ordered direct from the publisher for $24.95 plus $4.25 shipping and handling. Please enclose your check or money order and shipping information. For educational, government or multiple copy pricing, please contact the publisher. Library of Congress Cataloging-in-Publication Data ApexCLE, Inc. 1. ApexCLE, Inc. 2. Law-United States Guide-books. 3. Legal Guide 4. Legal Education. Page 2

3 About The Author Bruce degrazia has been a lawyer since 1984, when he began his career in the U.S. Navy, serving as a prosecutor and an advisor to the Commander, Naval Surface Force Atlantic Fleet. He then worked for Burditt, Bowles and Radius in Chicago, specializing in environmental litigation and international business law. From he was in-house attorney for Cummins Engine Company and United Technologies. In 1997, Mr. degrazia was appointed to be Assistant Deputy Under Secretary of Defense for Environmental Quality, in which position he was responsible for Defense Department policy in the areas of environmental compliance, conservation, pollution prevention, cultural resources, and American Indian issues. While there he supported the Vieques Commission in their determination that the Navy should find an alternative training area than the island of Vieques, near Puerto Rico. He also worked on the projects to raise the CSS Hunley and U.S.S. Monito After the Clinton Administration, he became Deputy General Counsel at Versar, an environmental and engineering company, where he saved the company over a million dollars in an environmental remediation case. In 2003 he joined Aitken Berlin. Author s Address: Author s Website: degrazia@ghsadvisors.com Author s Mailing Address: 2512 Babcock Road Vienna, VA Author s Phone Number: Page 3

4 I. Nature of computer security law Older than you think Both criminal and civil application Almost always a step (or two, or three...) behind technology A trap for the unwary or uninformed II. Major statutes relating to computer security Computer Fraud and Abuse Act of 1986 Related Illinois laws Sarbanes-Oxley Gramm-Leach-Bliley HIPAA Last three relate to specific business types Computer Fraud and Abuse Act of 1986, 18 U.S.C Oldest computer security law on the books Vague Amended to reflect homeland security concerns Both criminal and civil application Page 4

5 History of the CFAA Originally passed to protect access to government computers and the banking system Reach subsequently greatly extended Criminal application of the CFAA accessing a computer containing classified information accessing a computer and obtaining financial information, government information, or any information on a computer involved in interstate or foreign communication accessing a non-public government computer accesses a protected computer with intent to defraud and fraud is worth more than $5,000 sends malware that causes harm to a protected computer or damages and causes loss to a protected computer through unauthorized use traffics in passwords with intent to defraud or access government computer threatens to damage any protected computer or obtain information from it conspires to do any of the above Page 5

6 Criminal application of the CFAA (2) Terminology: protected computer is any computer used by U.S. government or a financial institution or any computer which is used in interstate or foreign commerce or communication (18 U.S.C. 1030(e)(2)) damage is any impairment to the integrity or availability of data, a program, a system, or information (18 U.S.C. 1030(e)(8)) loss is any reasonable cost to any victim, including response, damage assessment, restoration, and lost revenue as a result of interruption of service (18 U.S.C. 1030(e)(11)) Criminal application of the CFAA (3) Elements knowledge or intent to access unauthorized access or exceeding authorized access interstate or foreign commerce or communication causes damage or loss Penalties fine prison for up to twenty years for each offense Page 6

7 Notable criminal cases under the CFAA U.S. v. Mitra, 405 F.3d 492 (7th Cir. 2005) -- police radio system is a protected computer and is used in interstate commerce U.S. v. Kramer, 631 F.3d 900 (8th Cir.), cert. denied, 131 S.Ct (2011) -- cell phone is a computer even if it cannot access the Internet United States v. Aaron Swartz Case never went to trial Facts Charges Disposition Reaction Civil application of CFAA Most cases brought under the CFAA are civil A civil action under the statute will lie for any person who suffers loss by reason of a violation of this section (18 U.S.C. 1030(g)) Damages or equitable relief Must include loss of at least $5,000 (limited to economic damages) modification or impairment of medical diagnosis or treatment physical injury threat to public health or safety, or Page 7

8 Civil cases under CFAA International Airport Centers, LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006) using an erasure or deletion program is a transmission under (a)(5)(a)(i) -- the malware section authorization for a for an employee to use a computer ends when the employee decides to leave employment YourNetDating, LLC v. Mitchell, 88 F.Supp 2d 870 (N.D. Ill. 2000) -- TRO against further hacking is appropriate remedy Civil cases under CFAA (2) Penrose Computer Marketgroup v. Camin, 682 F.Supp 2d 202 (N.D.N.Y. 2010) -- deleting s and customer lists of employer does not violate CFAA access section if employment still active Scope of CFAA and possible changes Leaves significant discretion in the hands of prosecutors Numerous attempts in Congress to narrow scope Aaron s Law Illinois Computer Tampering Act, 720 ILCS 5/17-51 Follows CFAA with certain additions adds computer network, program and data to accessed areas Page 8

9 includes section prohibiting the falsification or altering of routing information civil action will lie for damaging computer, network, program, or data, or for damages as a result of spam 720 ICS 5/17-52 establishes the crime of aggravated computer tampering if the act interferes with government services creates strong probability of death or great bodily harm to one or more individuals Other Illinois statutes regarding computer security 720 ILCS 5/17-50 addresses computer fraud by prohibiting use of a computer, or damage to a computer, program or data, in connection with a fraudulent act all violations of this statute are felonies forfeiture of property is authorized 720 ILCS 5/17-50 prohibits the use of encryption as part of a crime, or to conceal it or its perpetrator(s) Anti-Phishing Act, 740 ILCS 7 Prohibits phishing Provides civil action for violation Damages of three times actual or $5,000, whichever is greater, for individual plaintiff actual damages or $500,000, whichever is greater for an aggrieved Internet provider or a trademark injunctive relief appropriate Page 9

10 attorneys fees recoverable court may increase damages if defendant engaged in pattern Sarbanes-Oxley Act of 2002 Official title: Sarbanes-Oxley Public Company Accounting Reform and Investor Protection Act of 2002 (SOX) (also known as the Corporate and Criminal Fraud Accountability Act of 2002) 15 U.S.7262 History Application to computer security Section 404 SEC CF Disclosure Guidance Topic No. 2 - cyber security (2011) Recent developments public companies are starting to disclose cyber security risks and attacks Mostly banks, but expected to expand Page 10

Cyber Attacks and Data Breaches: A Legal and Business Survival Guide

Cyber Attacks and Data Breaches: A Legal and Business Survival Guide Cyber Attacks and Data Breaches: A Legal and Business Survival Guide August 21, 2012 Max Bodoin, Vince Farhat, Shannon Salimone Copyright 2012 Holland & Knight LLP. All Rights Reserved What this Program

More information

H. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements.

H. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements. I 0TH CONGRESS ST SESSION H. R. To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements. IN THE HOUSE OF REPRESENTATIVES MAY, 00 Ms. LOFGREN (for

More information

SARBANES-OXLEY (SOX) ACT

SARBANES-OXLEY (SOX) ACT SARBANES-OXLEY (SOX) ACT Table of Contents Introduction 03 Who is affected by SOX? 05 Why should my organization 05 comply with SOX? What does SOX require for email 06 compliance? How can my organization

More information

Sarbanes-Oxley Act (SOX)

Sarbanes-Oxley Act (SOX) Sarbanes-Oxley Act (SOX) Introduction The Sarbanes-Oxley (SOX) Act was introduced in 2002 to protect shareholders and the general public from fraudulent accounting activities by bringing greater accountability

More information

The Computer Fraud and Abuse Act Prohibits Unauthorized Access, Not Use

The Computer Fraud and Abuse Act Prohibits Unauthorized Access, Not Use April 13, 2012 The Computer Fraud and Abuse Act Prohibits Unauthorized Access, Not Use (or the Ninth Circuit Really Likes ESPN.Com and Online Sudoku at Work) The other day, I stumbled upon a new touchstone

More information

COMMENTARY. Information JONES DAY

COMMENTARY. Information JONES DAY February 2010 JONES DAY COMMENTARY Massachusetts Law Raises the Bar for Data Security On March 1, 2010, what is widely considered the most comprehensive data protection and privacy law in the United States

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Ethical, legal, and policy issues related to security and privacy research and practice

Ethical, legal, and policy issues related to security and privacy research and practice Ethical, legal, and policy issues related to security and privacy research and practice Things to consider Criminal law Civil law University policy Community standards for ethics Criminal and civil law

More information

What To Do When Your Data Winds Up Where It Shouldn t

What To Do When Your Data Winds Up Where It Shouldn t What To Do When Your Data Winds Up Where It Shouldn t Don M. Blumenthal Defcon 16 Las Vegas, Nevada August 9, 2008 Disclaimer Opinions expressed are my own and intended for informational purposes. They

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations. Christopher S. Yoo University of Pennsylvania July 12, 2018

Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations. Christopher S. Yoo University of Pennsylvania July 12, 2018 Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations Christopher S. Yoo University of Pennsylvania July 12, 2018 Overview of Research Tort and products liability for CPS Privacy and

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

IS Today: Managing in a Digital World 9/17/12

IS Today: Managing in a Digital World 9/17/12 IS Today: Managing in a Digital World Chapter 10 Securing Information Systems Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006 Accessories for war

More information

WEBSITE TERMS OF USE

WEBSITE TERMS OF USE WEBSITE TERMS OF USE Effective Date: April 14, 2018 Welcome to the Center for Behavioral Sciences, Inc. ( CBS ) website! CBS, Inc. maintains this website ( Website ) for your personal information, education

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

CAN-SPAM Act of International Association of Privacy Professionals June 2004

CAN-SPAM Act of International Association of Privacy Professionals June 2004 CAN-SPAM Act of 2003 International Association of Privacy Professionals June 2004 Vice President & General Counsel, Digital Impact, Inc. Background; Pre-emption Background Law signed by President Bush

More information

Summary Comparison of Current Data Security and Breach Notification Bills

Summary Comparison of Current Data Security and Breach Notification Bills Topic S. 117 (Nelson) S. (Carper/Blunt) H.R. (Blackburn/Welch) Comments Data Security Standards The FTC shall promulgate regulations requiring information security practices that are appropriate to the

More information

Cybersecurity and Nonprofit

Cybersecurity and Nonprofit Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit

More information

Operational Network Security

Operational Network Security Tim Boerner April 25, 2013 CS598 Network Security Operational Network Security or how I learned that the purpose of network security has little to do with actually securing the network Introduction Thinking

More information

ANATOMY OF A DATA BREACH: DEVELOPMENTS IN DATA SECURITY AND CLOUD COMPUTING LAW

ANATOMY OF A DATA BREACH: DEVELOPMENTS IN DATA SECURITY AND CLOUD COMPUTING LAW ANATOMY OF A DATA BREACH: DEVELOPMENTS IN DATA SECURITY AND CLOUD COMPUTING LAW Janis Kestenbaum (Federal Trade Commission) John O Tuel (GlaxoSmithKline) Alfred Saikali (Shook Hardy & Bacon) Christopher

More information

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston CYBERSECURITY Recent OCR Actions & Cyber Awareness Newsletters Claire C. Rosston DISCLAIMER This presentation is similar to any other legal education materials designed to provide general information on

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal

More information

Is the Best Defense a Good Offense? Christopher T. Pierson, CIPP/US, CIPP/G James T. Shreve, CIPP/US, CIPP/IT

Is the Best Defense a Good Offense? Christopher T. Pierson, CIPP/US, CIPP/G James T. Shreve, CIPP/US, CIPP/IT Is the Best Defense a Good Offense? Christopher T. Pierson, CIPP/US, CIPP/G James T. Shreve, CIPP/US, CIPP/IT Agenda & Disclaimer 1. Scenarios 2. Issues - Status of Cybersecurity and Hacking 3. Capabilities

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF KENTUCKY SOUTHERN DIVISION LONDON * * * * * INTRODUCTION ALLEGATIONS

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF KENTUCKY SOUTHERN DIVISION LONDON * * * * * INTRODUCTION ALLEGATIONS UNITED STATES OF AMERICA UNITED STATES DISTRICT COURT EASTERN DISTRICT OF KENTUCKY SOUTHERN DIVISION LONDON ~a8tern lhstl'lg;' FILED DEC 18 2008,n Lmmor-. LESLIE G WHITMER CLERK U S DISTRICT COURT V. INDICTMENT

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Incident Handling. Week 4: Incidents, Evidence and the Law

Incident Handling. Week 4: Incidents, Evidence and the Law Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly University at Albany 4/27/04 Incident Handling (G. Berg & J. Gangolly) 1 Road Map What is digital evidence? What

More information

Securing Information Systems

Securing Information Systems Chapter 7 Securing Information Systems 7.1 2007 by Prentice Hall STUDENT OBJECTIVES Analyze why information systems need special protection from destruction, error, and abuse. Assess the business value

More information

SECURITY STATE OF THE INDUSTRY

SECURITY STATE OF THE INDUSTRY SECURITY STATE OF THE INDUSTRY An Interview with Stephen Treglia JD, HCISPP, HIPAA Compliance Officer, Investigations Section, Absolute OVERVIEW The health sector is rapidly adopting new technologies,

More information

AVOIDING LIABILITY UNDER THE CAN-SPAM ACT OF 2003 FOR SENDING COMMERCIAL

AVOIDING LIABILITY UNDER THE CAN-SPAM ACT OF 2003 FOR SENDING COMMERCIAL CLIENT MEMORANDUM AVOIDING LIABILITY UNDER THE CAN-SPAM ACT OF 2003 FOR SENDING COMMERCIAL EMAIL Background The provisions of the act entitled Controlling the Assault of Non-Solicited Pornography and Marketing

More information

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK INTRODUCTION Atlantic Broadband will assist law enforcement agencies in their investigations while protecting subscriber privacy as required by law and applicable

More information

What to do if your business is the victim of a data or security breach?

What to do if your business is the victim of a data or security breach? What to do if your business is the victim of a data or security breach? Introduction The following information is intended to help you decide how to start preparing for and some of the steps you will want

More information

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016 Cybersecurity Conference Presentation North Bay Business Journal September 27, 2016 1 PRESENTER Francis Tam, CPA, CISM, CISA, CITP, CRISC, PCI QSA Partner Information Security and Infrastructure Practice

More information

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

Archive Legislation:  archiving in the United Kingdom. The key laws that affect your business Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private

More information

How will cyber risk management affect tomorrow's business?

How will cyber risk management affect tomorrow's business? How will cyber risk management affect tomorrow's business? The "integrated" path towards continuous improvement of information security Cyber Risk as a Balance Sheet Risk exposing Board and C-Levels 2018

More information

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,

More information

UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT Grand Jury B-16-1 : VIOLATIONS: INDICTMENT. General Allegations

UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT Grand Jury B-16-1 : VIOLATIONS: INDICTMENT. General Allegations UNITED STATES OF AMERICA UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT Grand Jury B-16-1 F-l' E..: r) l! t... i!;,.,j' 2nn APR 2 0 P J! I ~ : Criminal No. 3:17CR 83( RN't!S~~I5l~~b~ ocupr v. PETER

More information

TERMS OF SERVICE AGREEMENT

TERMS OF SERVICE AGREEMENT TERMS OF SERVICE AGREEMENT LAST REVISION: [Date-Month-Year] PLEASE READ THIS TERMS OF SERVICE AGREEMENT CAREFULLY. BY USING THIS WEBSITE OR ORDERING PRODUCTS FROM THIS WEBSITE YOU AGREE TO BE BOUND BY

More information

Cybersecurity is a Company-Wide Issue

Cybersecurity is a Company-Wide Issue Cybersecurity is a Company-Wide Issue Cybersecurity issues often implicate (and are implicated by) multiple issues and areas within a company, both before and after an incident occurs Personnel Clients

More information

Legal Disclaimer. Copyright Notice

Legal Disclaimer. Copyright Notice Legal Disclaimer Although the information provided by Clearwater Compliance may be helpful in informing customers and others who have an interest in data privacy and security issues, it does not constitute

More information

Union Bank s NMLS REGISTRATION GUIDE. PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO)

Union Bank s NMLS REGISTRATION GUIDE. PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO) Union Bank s NMLS REGISTRATION GUIDE PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO) Revised 4/17/2012 Table of Contents 1.0 S.A.F.E. ACT... 3 1.1 Background... 3 1.2 Registration Overview for s...

More information

INTRODUCTION. 2 Modere.com Terms of Use

INTRODUCTION. 2 Modere.com Terms of Use TERMS OF USE INTRODUCTION WELCOME TO THE MODERE.COM WEBSITE (THE SITE ). MODERE, INC. (HEREAFTER WE, OUR, US OR MODERE ) PROVIDES SERVICES TO YOU SUBJECT TO THE NOTICES, TERMS, AND CONDITIONS SET FORTH

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service The Readlyn Telephone Company, dba RTC Communications (the Company) Acceptable Use Policy

More information

Introduction to Ethical Hacking. Chapter 1

Introduction to Ethical Hacking. Chapter 1 Introduction to Ethical Hacking Chapter 1 Definition of a Penetration Tester Sometimes called ethical hackers though label is less preferred Pen testers are: People who assess security of a target Specially

More information

What is Cybersecurity?

What is Cybersecurity? What is Cybersecurity? Protection against unauthorized access to or use of assets via electronic means Not limited to what we think of as Hacking : Fraud Prevention Misuse of Appropriate Access Important

More information

INCLUDING MEDICAL ADVICE DISCLAIMER

INCLUDING MEDICAL ADVICE DISCLAIMER Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of

More information

SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks

SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks By Richard A. Blunk (Thermopylae Ventures, LLC) and Apprameya Iyengar (Morrison Cohen LLP) The SEC has continued

More information

CYBERCRIME The Legal Issues

CYBERCRIME The Legal Issues The IBIA Annual Convention Cancun 3-5 November, 2015 CYBERCRIME The Legal Issues J. Stephen Simms jssimms@simmsshowers.com +1.410.783.5795 Welcome to Cyber-Holics Anonymous Group Therapy To Start our meeting:

More information

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly State University of New York at Albany Road Map What is digital evidence? What are different types of evidence?

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

Performance Audit: City Could Better Protect Personally Identifiable Information July 2015

Performance Audit: City Could Better Protect Personally Identifiable Information July 2015 Performance Audit: City Could Better Protect Personally Identifiable Information July 2015 City Auditor City of Lawrence, Kansas July 30, 2015 Members of the City Commission The City should adopt recommended

More information

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Teaching cybersecurity across the disciplines Debasis Bhattacharya debasisb@hawaii.edu maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Agenda Background Cybersecurity Education - Traditional

More information

PULSE TAKING THE PHYSICIAN S

PULSE TAKING THE PHYSICIAN S TAKING THE PHYSICIAN S PULSE TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity.

More information

Hacking. Professor Grimmelmann Internet Law Fall 2007 Class 15

Hacking. Professor Grimmelmann Internet Law Fall 2007 Class 15 Hacking Professor Grimmelmann Internet Law Fall 2007 Class 15 Where we are Part I: Public Law Part II: Private Law Control over Computers Domain Names Copyright Innovation Case Studies In Today s Class

More information

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest? Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information

More information

ID Theft and Data Breach Mitigation

ID Theft and Data Breach Mitigation ID Theft and Data Breach Mitigation Jeremy Gilbert, GCFE, GASF, EnCE, CPA 1 Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk 2 Consumer Identity

More information

The Impact of Cybersecurity, Data Privacy and Social Media

The Impact of Cybersecurity, Data Privacy and Social Media Doing Business in a Connected World The Impact of Cybersecurity, Data Privacy and Social Media Security Incident tprevention and Response: Customizing i a Formula for Results Joseph hm. Ah Asher Marcus

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice

More information

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017 COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

SEC Issues Updated Guidance on Cybersecurity Disclosure

SEC Issues Updated Guidance on Cybersecurity Disclosure February 27, 2018 SEC Issues Updated Guidance on Cybersecurity Disclosure On February 21, 2018, the Securities and Exchange Commission (the SEC ) issued an interpretive release providing Commission-level

More information

Web Point and Print White Paper

Web Point and Print White Paper 07/26/2010 Technical Information: White Paper Document Version 1.0 Copyright 2010 RICOH Americas Corporation. All rights reserved. Page 1 of 9 Visit our Knowledgebase at: http://tsrc.ricoh-usa.com/ref/faq.asp

More information

The Stakes Are Going Up: Hacking and the New Paradigm of Data Breaches

The Stakes Are Going Up: Hacking and the New Paradigm of Data Breaches The Stakes Are Going Up: Hacking and the New Paradigm of Data Breaches Edward McNicholas Global Co-Leader, Privacy, Data Security and Information Law Sidley Austin LLP The cyber threat is one of the most

More information

The Promise and Peril of Active Cyber Defense

The Promise and Peril of Active Cyber Defense 1 The Promise and Peril of Active Cyber Defense Dr. Irv Lachow Deputy Director, Cyber Strategy and Execution, MITRE August 6, 2018 2017 The MITRE Corporation. All rights reserved. 2 Disclaimer The author's

More information

CRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised

CRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised CRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised TUESDAY, MAY 24, 2011 Alston & Bird LLP PricewaterhouseCoopers Silverpop www.pwc.com Data

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

Data Privacy and Cybersecurity

Data Privacy and Cybersecurity Data Privacy and Cybersecurity Key Contacts Timothy C. Blank Boston +1 617 728 7154 Dr. Olaf Fasshauer National Munich +49 89 21 21 63 28 Joshua H. Rawson New York +1 212 698 3862 Translate Page In an

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

NASD NOTICE TO MEMBERS 97-58

NASD NOTICE TO MEMBERS 97-58 NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management

More information

Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016

Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016 Data and Cyber Crisis how to manage a crisis and reduce loss Melissa Russell Special Counsel February 2016 Introduction cyber risks Most commonly reported types of economic crime from PwC The causes and

More information

HIPAA FOR BROKERS. revised 10/17

HIPAA FOR BROKERS. revised 10/17 HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 University of Michigan Deep Blue deepblue.lib.umich.edu 2010-08 SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 Blumenthal, Don Blumenthal, D. (2010,

More information

HIPAA UPDATE. Michael L. Brody, DPM

HIPAA UPDATE. Michael L. Brody, DPM HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital

More information

Legal Aspects of Cybersecurity

Legal Aspects of Cybersecurity Legal Aspects of Cybersecurity John W. Mashni Taylor A. Gast (517) 371-8257 (517) 371-8238 jmashni@fosterswift.com tgast@fosterswift.com Alexander A. Ayar (248) 538-6326 AAyar@FosterSwift.com Risks Data

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

Navigating Regulatory Impacts of a Financial Services Data Breach

Navigating Regulatory Impacts of a Financial Services Data Breach Navigating Regulatory Impacts of a Financial Services Data Breach Stacey C. Bolton, CIPP SVP, Global Head of Privacy and Information Management The Northern Trust Company Email: scb8@ntrs.com Phone: 312-557-1558

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

I. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT

I. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT September 13, 2004 Via Electronic Mail Federal Trade Commission Office of the Secretary Room H-159 600 Pennsylvania Avenue, NW Washington, D.C. 20580 Re: CAN-SPAM Act Rulemaking, Project No. R411008 Ladies

More information

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

GLBA. The Gramm-Leach-Bliley Act

GLBA. The Gramm-Leach-Bliley Act GLBA The Gramm-Leach-Bliley Act Table of content Introduction 03 Who is affected by GLBA? 06 Why should my organization comply with GLBA? 07 What does GLBA require for email compliance? 08 How can my organization

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information