WILLIAM RM LONG Partner

Size: px
Start display at page:

Download "WILLIAM RM LONG Partner"

Transcription

1 Partner London PRACTICES Banking and Financial Services Healthcare Privacy, Data Security and Information Law INDUSTRIES Financial Services Life Sciences AREAS OF FOCUS Business Transactions Involving Financial Institutions Clinical Trials Consumer Protection and Unfair Trade Practices Cybersecurity, Cybercrime and Data Breaches Electronic and Mobile Commerce EU - Food, Drug and Medical Device Regulatory EU and International Privacy FCPA/Anti-Corruption Financial Industry and Payment Processing Financial Information and Privacy Law Financial Institutions Counseling Financial Services Legislation Global Financial Services Healthcare Information and Privacy Healthcare Regulatory Information Security and Data Breaches Internal Investigations Internet, Social Media and E-Commerce IT Procurement and Outsourcing Life Sciences Transactions Mass Media Communications Medical Devices Payments Pharmaceuticals Retail Financial Services Technology, Media and Privacy Law Telecommunications, Broadband and Video WILLIAM LONG advises international clients on a wide variety of data protection, privacy, information security, social media, e-commerce and other regulatory matters. William has been a member of the European advisory board of the International Association of Privacy Professionals (IAPP) and has experience with EU and international data protection and e-commerce projects working for clients in financial services and life sciences, as well as other sectors. Representative matters have included: Advising a global e-commerce company on dealing with an international data security breach. Assisting a global manufacturing company with a global data protection project including implementation of Binding Corporate Rules. Assisting a global medical device manufacturer with a global data protection project including 1

2 implementation of Binding Corporate Rules, dealing with cross-border data transfer issues and assisting with data protection filings. William was previously in-house counsel to one of the world s largest international financial services groups. He has been a member of a number of working groups in London and Europe looking at the EU regulation of e-commerce and data protection and spent a year at the UK s Financial Law Panel (established by the Bank of England), as assistant to the Chief Executive working on regulatory issues with online financial services. William is recognized in Chambers UK 2016 for Data Protection and Information Law, with sources telling the publication he is very knowledgeable, has his finger on the pulse and a very good collaborative spirit. He is also recognized in the LMG Life Sciences Guide for Intellectual Property. Most recently, William is recommended for both Data Protection and Pharmaceuticals and Biotechnology in The Legal 500 UK 2015, with clients describing him as academically brilliant and very commercially astute. He is also listed in the 2015 edition of Best Lawyers in Privacy & Data Protection. William is on the editorial board for ehealth Law & Policy and efinance & Payments Law & Policy and is on the DataGuidance panel of data protection lawyers. He is a contributor to a number of books on data protection including leading legal text books published by BNA in the area of privacy including ones on cloud computing and the use of health data. William also contributed to a major global survey of Privacy, Data Protection and Cybersecurity law covering 62 international jurisdictions which was published in late 2014 by Law Business Research. He has also been interviewed widely for his thought leadership, including in such leading publications as the Financial Times and International New York Times and writes for a number of publications including Computer Weekly, Cloud Pro and CIO Today. PUBLICATIONS The Impact of the Court of Justice of the EU s Judgment Declaring The European Commission s EU-U.S. Safe Harbor Decision Invalid, co-authored with Cam Kerry, BNA's Privacy and Security Law Report, November 23, 2015 Cross-border overview: data privacy and transfer, co-authored with Michele Tagliaferri, The European, Middle Eastern and African Investigations Review, August 2015 Proposed EU Data Regulations Will Impact California, Daily Journal, July 13, 2015 EU General Data Protection Regulation comes into sharper focus, ComputerWeekly, June 29, 2015 Final Negotiations Set To Begin On EU Data Privacy Law, co-authored with Francesca Blythe, Law360, June 22, 2015 Generational interpretations and expectations of privacy, co-authored with Geraldine Scali and Francesca Blythe, Data Protection Law & Policy, February 2015 European Union Overview, and United Kingdom, in The Privacy, Data Protection and Cybersecurity Law Review, November 2014 What to Expect from Europe s NIS Directive, ComputerWeekly, September 2014 Significant Impact of New EU Data Protection Regulation on Financial Services, Global Banking & Finance Review, April 18, 2014 CIOs and the changing legal landscape, CIO Today UK, March 2014 Proposed EU communications network will impact US businesses, CA Daily Journal, March 6, 2014 A Safe Direction, European Pharmaceutical Contractor, March 1, 2014 European Cloud Computing Strategy to create 2.5 million new jobs, ComputerWeekly, January 7,

3 Data protection challenges in the new era of Big Data, co-authored with Geraldine Scali, Data Protection Law & Policy, January 2014 Time for CIOs to Act on Proposed EU Data Privacy Laws, I-CIO, December 2013 EU Data Protection Regulation: Fines Up to 100 million Proposed, Computer Weekly, November 13, 2013 Safe Harbor for the cloud - not any port in the storm, Contributor, CloudPro, August 28, 2013 The New EU Data Protection Regulation: What will the Impact be on the Life Sciences Industry? March 2012 First Look: Leaked Draft of New EU Data Protection Regulation Suggests Significant Impacts for Global Businesses, December 9, 2011 EU Implementation of New Website Cookie Law, Data Protection Law & Policy, August 2011 European Shift to Concrete Cost Analysis of Data Protection, March 14, 2011 Pharmacovigilance and Data Protection, Data Protection Law & Policy, December 2010 Data Security and payments: dynamic Phorm of development, E-Finance Law & Policy, April 2009 Assessing the EU Working Party s Guidance on Harmonizing U.S. Discovery and EU Data Protection Requirements, March 9, 2009 Data Security breaches: the changing legal landscape, E-Finance Law & Policy, October 2008 New International Guidelines on the Transfer of Personal Health Data, Medical Research Law & Policy Selected Sidley Updates: Political Agreement Reached on EU Data Protection Regulation - December 18, 2015 Call for Safe Harbor 2.0; Companies Have Three Months to Assess Solutions - October 16, 2015 European Court of Justice Declares Safe Harbor Invalid - October 7, 2015 Opinion by ECJ Advocate General Finds Safe Harbor Invalid - September 24, 2015 One Step Closer to the EU Data Protection Regulation - June 15, 2015 Google Inc. v. Vidal-Hall: Opening the Doors to EU Data Protection Litigation? - May 12, 2015 UK Government launches new Cyber Essentials measures - June 18, 2014 European Parliament Votes to Approve New EU Data Protection Regulation and Immediate Suspension of Safe Harbor - March 17, 2014 European Parliament s Civil Liberties Committee Report calls for immediate suspension of Safe Harbor - January 10, 2014 European Commission makes recommendations to strengthen Safe Harbor - December 3, 2013 MEMBERSHIPS & ACTIVITIES Member of the International Association of Privacy Professionals (IAPP) European Advisory Board Member of the American Chamber of Commerce Co-founder of the Social Media Governance Forum Previous Member of the Centre for European Policy Studies Working Group on ecommerce Regulation 3

4 EVENTS Speaking Engagements Safe Harbor Data Privacy Briefing: Your Questions Answered by Giovanni Buttarelli, DataGuidance Webinar, October 20, 2015 Safe Harbor Data Privacy Briefing: Your Questions Answered, DataGuidance Webinar, October 8, 2015 The Impact on Business & Diplomatic Organizations, Cybersecurity & Management Challenges, Lugano, September 30, 2015 The Impact of the GDPR on Outsourcing, DataGuidance Webinar, September 23, 2015 Update on EU Data Privacy Issues, dplegal bi-annual meeting, Geneva, June 16-17, 2015 How to implement privacy programmes in practice, dplegal bi-annual meeting, Geneva, June 16-17, 2015 Big Data and Privacy, DataGuidance Webinar, May 20, 2015 EU Data Protection Regulation Implications for the Life Sciences Industry, Life Sciences College, London, May 13, 2015 How to Implement the Data Protection Regulation in Practice, IAPP Europe Data Protection Intensive, London, April 15, 2015 Update on the proposed EU Data Protection Regulation, Association of Corporate Counsel Webinar, April 9, 2015 DataGuidance Data Protection Financial Services Day, January 29, 2015 Cybersecurity Breakfast Roundtable, London, November 2014 DataGuidance Webinar, Information Security, December 2014 How to deal with cyber security risks, DataGuidance Webinar, July 2014 Privacy Laws & Business Conference, Queen s College, Cambridge University, Cambridge, June/July 2014 Life Sciences College, Brussels, May 2014 ABI Cyber Risks and Cyber Opportunities Seminar, London, May 2014 IAPP Europe Data Protection Intensive, London, April 2014 dplegal webinar on data privacy issues with disclosure of clinical trial reports, March 2014 Cloud Computing and Data Protection Roundtable, London, March 2014 Stafford Publications webinar on data privacy compliance in global transactions, March 2014 ehealth Law & Policy conference on e-health and data protection issues, London, February 2014 Webinar on social media and data protection issues, February 2014 DataGuidance webinar on Legal Developments with Information Security, January 2014 Risk & Opportunity: Big Data, Data Protection & Financial Services event in conjunction with DataGuidance, January 30, 2014 How to Build Your Data Breach Toolkit, IAPP Europe Data Protection Congress, December 10-12,

5 IAPP Europe Conference, Information Security, Brussels, November 2013 Cloud Computing Roundtable, London, November 2013 ABI Cybersecurity Conference, London, September 2013 Cloud Computing Roundtable, London, September 2013 EU Life Sciences Update on social media and data protection, Palo Alto, July 2013 Privacy Laws & Business Conference at Queen s College, Cambridge University, Cambridge, July 2013 Pharmacovigilance Conference on UK data protection, London, July 2013 Global Life Sciences European Law Seminar, Palo Alto, July 2013 Cloud Computing Roundtable, London, June 2013 dplegal bi-annual meeting at the offices of Leo Pharma, Denmark, June 2013 Financial Services webinar in conjunction with DataGuidance, June 27, 2013 Legal Issues Affecting the Middle Market, CPI s EMEA Middle Market Conference, June 11, 2013 Update on the Proposed EU Data Protection Regulation and Its Impact on the Life Sciences Industry, Life Sciences College, April 17-18, 2013 IAPP Europe Data Protection Intensive, London, April 2013 Draft EU Parliament LIBE Committee s Report, cyber security and anti-money laundering, DataGuidance Financial Services Group, March 20, 2013 IAPP Webinar on Binding Corporate Rules, February 2013 DataGuidance Webinar on the EU Data Protection Regulation, January 2013 Cloud Computing Conference, London, December 2012 IAPP Europe Conference, Brussels, November 2012 dplegal launch event, Brussels, November 2012 DataGuidance Annual Financial Services Conference, London, November 2012 Secondary research issues at ctlegal bi-annual meeting, Amsterdam, October 2012 ABPI - The Future of Data Protection Seminar, London, July 2012 Sidley Life Sciences and Data Privacy Day, Brussels, July 2012 Mobile apps session at Privacy laws & Business Conference, Cambridge, July 2012 Brussels Data Protection Roundtable, Brussels, June 2012 European Direct Selling Association, Brussels, May 2012 Georgetown University Corporate Counsel Institute, Madrid, May 2012 Life Sciences and Data Privacy Day, Palo Alto, April 17, 2012 California Biotech conference on data privacy, California, March 9, 2012 IAPP Europe Data Protection Congress, Paris, November 29-30, 2011 SCL Seminar on Risk and Governance for IT Companies, London, November 17,

6 Life Sciences & Data Privacy Day, New York, November 9, 2011 Global Forum, Brussels, November 7-8, 2011 Data Privacy, IAPP Training Day, London, October 18-19, 2011 DataGuidance Annual Data Protection in Financial Services Intensive, London, October 12, 2011 RSA Conference Europe 2011 efraud Network (efn) Forum, London, October 10, 2011 Social Media Governance Forum, London, July 19, 2011 and September 26, 2011 Privacy Laws & Business 24th Annual International Conference, Cambridge, July 11-14, 2011 DataGuidance Financial Services Group Forum, London, July 5, 2011 Life Sciences & Data Privacy Day, London, June 9, 2011 Data Privacy, EuroForum Conference on Clinical Trial Safety & Pharmacovigilance, Denmark, June 8, 2011 European DataGuidance Data Protection Intensive, London, May 26-27, 2011 Data Privacy at the Cloud Computing Forum, London, May 19, 2011 DataGuidance Financial Services Group Forum, London, January 18, 2011 ADMISSIONS & CERTIFICATIONS England and Wales (Solicitor), 1993 EDUCATION Queen Mary College, London, LL.B.,

Getting Your Privacy House in Order

Getting Your Privacy House in Order Getting Your Privacy House in Order Lisa J. Sotto Ewa Abrams Victoria King Partner Associate General Counsel Global Privacy Officer Hunton & Williams LLP Tiffany & Co. UPS (212) 309-1223 (212) 230-5351

More information

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com

More information

Developing and Implementing Data Protection Law: Malaysia and Beyond

Developing and Implementing Data Protection Law: Malaysia and Beyond Developing and Implementing Data Protection Law: Malaysia and Beyond Professor Abu Bakar Munir Faculty of Law, University of Malaya Malaysia K&K Advocates - Expert Panel Discussion on Data Protection Jakarta,

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Data Privacy and Cybersecurity

Data Privacy and Cybersecurity Data Privacy and Cybersecurity Key Contacts Timothy C. Blank Boston +1 617 728 7154 Dr. Olaf Fasshauer National Munich +49 89 21 21 63 28 Joshua H. Rawson New York +1 212 698 3862 Translate Page In an

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS

EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified

More information

SCCE ECEI 2014 EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS. Monica Salgado JANINE REGAN CIPP/E

SCCE ECEI 2014 EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS. Monica Salgado JANINE REGAN CIPP/E EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified

More information

PROJECT BACKGROUND AND RATIONALE

PROJECT BACKGROUND AND RATIONALE PROJECT BACKGROUND AND RATIONALE The political agreement on the EU General Data Protection Regulation (GDPR) has been reached and the new Regulation will be on the books by the end of the first quarter

More information

Cisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th

Cisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th Cisco Spark and GDPR Thomas Flambeaux Collaboration Consulting Solution Engineer, Security and Compliance Cisco Connect 2018 Copenhagen April 12th 2015 Cisco and/or its affiliates. All rights reserved.

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising

More information

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest? Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information

More information

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack

More information

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 1 1 INTRODUCTION 3 2 SUMMARY OF THE PROCESS 3 2.1 WORKING GROUP ACTIVITIES 3 2.2 STAKEHOLDER CONSULTATIONS 5 3 STAKEHOLDERS'

More information

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud

Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud ICT2015, 21 October 2015 Lisbon, Portugal Dr. Paolo Balboni, Partner at ICT Legal Consulting & Scientific Director

More information

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Privacy Notice - General Data Protection Regulation ( GDPR )

Privacy Notice - General Data Protection Regulation ( GDPR ) THIS PRIVACY NOTICE APPLIES TO ANY PERSON WHO INSTRUCTS AN INDIVIDUAL BARRISTER AT 12 OLD SQUARE CHAMBERS EITHER DIRECTLY OR THROUGH A SOLICITOR OR WHO ASKS THE INDIVIDUAL BARRISTER FOR A REFERENCE Privacy

More information

Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification

Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification July 2016 Follow @Paul_Hastings Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification By Paul Hastings Global Privacy and Cybersecurity

More information

AFC Compliance Careers

AFC Compliance Careers AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation

More information

International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018

International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 Dr. Dennis-Kenji Kipker University of Bremen Washington DC, 10.04.2018 Gefördert vom FKZ: 16KIS0213 bis 16KIS0216 Slide

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Regulating Cyber: the UK s plans for the NIS Directive

Regulating Cyber: the UK s plans for the NIS Directive Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon

More information

Manuel E. Maisog Partner

Manuel E. Maisog Partner Biographies Manuel E. Maisog Partner bmaisog@hunton.com Beijing +86 10 5863 7507 direct Languages: English, Mandarin Chinese SERVICES Industries Energy Financial Services Retail and Consumer Products Practices

More information

Hong Kong s Personal Data (Privacy) Ordinance

Hong Kong s Personal Data (Privacy) Ordinance Asia Privacy Bridge Forum 11 May 2016 Hong Kong s Personal Data (Privacy) Ordinance Fanny Wong Deputy Privacy Commissioner for Personal Data Hong Kong, China The Personal Data Landscape in Asia 2011 2003

More information

Hot Topics in Privacy

Hot Topics in Privacy Hot Topics in Privacy Gretchen S. Herault Monster Worldwide SCCE Conference April 12, 2013 Agenda Privacy Landscape current state of regulatory coverage > Global > Industry Sector > Technology Hot Topics

More information

Hot Topics in Privacy

Hot Topics in Privacy Hot Topics in Privacy Gretchen S. Herault Monster Worldwide SCCE Conference April 12, 2013 Agenda Privacy Landscape current state of regulatory coverage > Global > Industry Sector > Technology Hot Topics

More information

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology 24 October 2017 Content Overview of Cyber Security Law Observations on Implementation of Cyber

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting

More information

13303/17 CB/ek 1 DGE 2B

13303/17 CB/ek 1 DGE 2B Council of the European Union Brussels, 19 October 2017 (OR. en) 13303/17 NOTE From: Permanent Representatives Committee (Part 1) To: Council TELECOM 238 ENER 406 COMPET 675 DATAPROTECT 159 AUDIO 112 CYBER

More information

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant

More information

Block 1: Introduction Overview, Requirements, Knowledge Profiles. FH-Prof. DI Dr. Stefan Sauermann Juliane Herzog, MSc.

Block 1: Introduction Overview, Requirements, Knowledge Profiles. FH-Prof. DI Dr. Stefan Sauermann Juliane Herzog, MSc. Block 1: Introduction Overview, Requirements, Knowledge Profiles FH-Prof. DI Dr. Stefan Sauermann Juliane Herzog, MSc. University of Applied Sciences Technikum Wien University of Applied Sciences (UAS)

More information

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe Respecting Privacy, Securing Data and Enabling Trust a view from Europe Robert Bond, Partner & Notary Public Robert Bond Robert Bond has nearly 40 years' experience in advising national and international

More information

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

DIGITAL AGENDA FOR EUROPE

DIGITAL AGENDA FOR EUROPE DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Magento GDPR Frequently Asked Questions

Magento GDPR Frequently Asked Questions Magento GDPR Frequently Asked Questions Whom does GDPR impact? Does this only impact European Union (EU) based companies? The new regulation provides rules that govern how companies may collect and handle

More information

Roy E. Hadley, Jr. Overview. Partner. Contact Information. Education.

Roy E. Hadley, Jr. Overview. Partner. Contact Information. Education. Roy E. Hadley, Jr. Partner Roy.Hadley@ThompsonHine.com Corporate Transactions & Securities International Privacy & Information Security Overview With a practice that is international in scope, Roy counsels

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

Talenom Plc. Description of Data Protection and Descriptions of Registers

Talenom Plc. Description of Data Protection and Descriptions of Registers Talenom Plc. Description of Data Protection and Descriptions of Registers TALENOM DESCRIPTION OF DATA PROTECTION Last updated 14 March 2018 Scope Limitations Data protection principles Personal data Registers

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Promoting Digital Economy in the Eastern Partnership. Vassilis Kopanas European Commission, DG CONNECT

Promoting Digital Economy in the Eastern Partnership. Vassilis Kopanas European Commission, DG CONNECT Promoting Digital Economy in the Eastern Partnership Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014

More information

Cyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK

Cyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK Cyber Security Issues and Responses Andrew Rogoyski Head of Cyber Security Services CGI UK andrew.rogoyski@cgi.com CGI in cyber security Credentials Clients We have over 35 years of experience working

More information

Section I. GENERAL PROVISIONS

Section I. GENERAL PROVISIONS LAW OF THE RUSSIAN FEDERATION NO. 5151-1 OF JUNE 10, 1993 ON CERTIFICATION OF PRODUCTS AND SERVICES (with the Additions and Amendments of December 27, 1995, March 2, July 31, 1998) Federal Law No. 154-FZ

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

Future-Proof Security & Privacy in IoT

Future-Proof Security & Privacy in IoT All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July Privacy Notice Lonsdale & Marsh understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our clients and will

More information

Internet Governance in September September 2016

Internet Governance in September September 2016 Internet Governance in September 2016 27 September 2016 Main events in September 1-2 Sept: Bern Symposium on Global Cybersecurity Awareness Messaging (Bern) 5-8 Sept: Global ICT Capacity Building Symposium

More information

U.S. Private-sector Privacy Certification

U.S. Private-sector Privacy Certification 1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy

More information

Note by the Secretary- General CANDIDACY FOR THE POST OF DIRECTOR OF THE TELECOMMUNICATION STANDARDIZATION BUREAU (TSB)

Note by the Secretary- General CANDIDACY FOR THE POST OF DIRECTOR OF THE TELECOMMUNICATION STANDARDIZATION BUREAU (TSB) Plenipotentiary Conference (PP-14) Busan, 20 October 7 November 2014 PLENARY MEETING Document 6- E 21 October 2013 Original: English Note by the Secretary- General CANDIDACY FOR THE POST OF DIRECTOR OF

More information

GDPR Privacy Webinar. Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018

GDPR Privacy Webinar. Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018 GDPR Privacy Webinar Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018 Prioritizing Your Path to GDPR Compliance Presented by Half-Day Workshops Online

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor Cybersecurity and Privacy Innovation Forum 2015 Brussels, 28 April 2015 Keynote address Giovanni Buttarelli European Data Protection Supervisor Ladies and gentlemen, Let me first thank the organisers for

More information

State Planning Organization Information Society Department

State Planning Organization Information Society Department Information Society Department - October TR. Information Society Department Information Society Strategy Duration / Pro- Post- 1 Formulating the Information Society Strategy All Public Institutions Universities

More information

International Compliance

International Compliance International Compliance for Higher Ed Martin Biegelman, Deloitte Financial Advisory Services LLP Carolyn Marks, Yale University June 6, 2016 SCCE 2016 Higher Education Compliance Session Objectives Discuss

More information

Data Protection in Switzerland Update Following the Safe Harbor Decision. 21 October 2015 / 6 February 2016 Christian Wyss

Data Protection in Switzerland Update Following the Safe Harbor Decision. 21 October 2015 / 6 February 2016 Christian Wyss Data Protection in Switzerland Update Following the Safe Harbor Decision 21 October 2015 / 6 February 2016 Christian Wyss Agenda Data Protection in Switzerland The Safe Harbor Decision How to Restore Compliance?

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

MARKETING ALLIANCE MEDIA KIT 2016/17

MARKETING ALLIANCE MEDIA KIT 2016/17 1 MARKETING ALLIANCE MEDIA KIT 2016/17 2 Our Audience Social Media over 2.5 million C-Level Executives, NGOs, and business owners Our Magazines Featured on itunes and Google Play and promoted through our

More information

Virtual Currencies and The Commonwealth. 1 June 2016

Virtual Currencies and The Commonwealth. 1 June 2016 1 Virtual Currencies and The Commonwealth 1 June 2016 The Commonwealth Cybercrime Initiative Mission CCI aims to provide coherent, comprehensive and sustainable assistance to member states to build capacity

More information

The Stakes Are Going Up: Hacking and the New Paradigm of Data Breaches

The Stakes Are Going Up: Hacking and the New Paradigm of Data Breaches The Stakes Are Going Up: Hacking and the New Paradigm of Data Breaches Edward McNicholas Global Co-Leader, Privacy, Data Security and Information Law Sidley Austin LLP The cyber threat is one of the most

More information

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud Cybersecurity Policy in the EU: The Network and Information Security Directive - Security for the data in the cloud Microsoft Commitment to Cybersecurity Security at the heart of our products and services

More information

CISI Continuing Professional Development (CPD) Policy

CISI Continuing Professional Development (CPD) Policy CISI Continuing Professional Development (CPD) Policy This policy relates to the CISI CPD requirements and the relevance of CPD for members, including recommended and unacceptable CPD. 1. CISI CPD Requirements

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

Report on the activities of the Independent Integrity Unit, November 2016 to September 2017

Report on the activities of the Independent Integrity Unit, November 2016 to September 2017 Meeting of the Board 30 September 2 October 2017 Cairo, Arab Republic of Egypt Provisional agenda item 8 GCF/B.18/Inf.12 29 September 2017 Report on the activities of the Independent Integrity Unit, November

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

Privacy Notice. General Information Protection Regulation ( GDPR )

Privacy Notice. General Information Protection Regulation ( GDPR ) Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise

More information

General Data Protection Regulation (GDPR) The impact of doing business in Asia

General Data Protection Regulation (GDPR) The impact of doing business in Asia SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013 Deanna Williams FOUNDED 1980 In 1980, a group of professional and occupational regulators and private sector representatives met in New Orleans to discuss their need to share information. GOAL of New ORGANIZATION

More information

8. AUTOMATED DECISION MAKING DURING DATA PROCESSING FURTHER INFORMATION FURTHER INFORMATION AND GUIDANCE CONTACT US...

8. AUTOMATED DECISION MAKING DURING DATA PROCESSING FURTHER INFORMATION FURTHER INFORMATION AND GUIDANCE CONTACT US... Contents 1. DEFFINITIONS... 2 2. INTRODUCTION... 2 3. WHO WE ARE... 2 4. JUSTIFICATION FOR PROCESSING PERSONAL DATA... 2 5. LAWFUL BASIS FOR COLLECTING AND PROCESSING PERSONAL DATA... 3 5.1 LEGITIMATE

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

Proposed WEEE Directive A Step-by-Step Analysis

Proposed WEEE Directive A Step-by-Step Analysis Proposed WEEE Directive A Step-by-Step Analysis NEMI Product Take-Back and Recycling Workshop October 10-11 Louisville, Colorado Jean-Philippe Brisson, attorney jp.brisson@allenovery.com Outline Section

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Advising the C-Suite and Boards of Directors on Cybersecurity. February 11, 2015

Advising the C-Suite and Boards of Directors on Cybersecurity. February 11, 2015 Advising the C-Suite and Boards of Directors on Cybersecurity February 11, 2015 Agenda Introductions / Administrative Cybersecurity risk legal landscape Cyber threats Legal risks in the aftermath of a

More information

African Theatre Association (AfTA) PRIVACY POLICY

African Theatre Association (AfTA) PRIVACY POLICY African Theatre Association (AfTA) PRIVACY POLICY 1. Our Privacy Pledge We store your personal data safely. We won't share your details with anyone else. You can change your preferences or opt out from

More information

Core Elements of HIPAA The Privacy Rule establishes individuals privacy rights and addresses the use and disclosure of protected health information ( PHI ) by covered entities and business associates The

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

EU data security and privacy trends

EU data security and privacy trends EU data security and privacy trends Top issues for HR and global mobility 26 29 October 2014 Disclaimer EY refers to the global organization, and may refer to one or more, of the member firms of Ernst

More information

Connected & Autonomous Vehicles

Connected & Autonomous Vehicles Connected & Autonomous Vehicles SAFETY CYBERSECURITY & DATA PRIVACY CORPORATE/ FINANCE TECHNOLOGY TRANSACTIONS Safety. Seasoned lawyers with decades of hands-on experience in vehicle safety compliance,

More information

Mapping to the National Broadband Plan

Mapping to the National Broadband Plan The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National

More information

Embedding Privacy by Design

Embedding Privacy by Design Embedding Privacy by Design Metric Stream Customer Conference May 12, 2015 TRUSTe Data Privacy Management Solutions 1 Today s Agenda Privacy in the Context of GRC Data Privacy Management and Top Privacy

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability

ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability Prof. Dr. Paolo Balboni Founding Partner Professor of Privacy, Cybersecurity, and IT Contract

More information

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of

More information

CASE STUDY CHIEF INFORMATION OFFICER GROUP

CASE STUDY CHIEF INFORMATION OFFICER GROUP CASE STUDY Project description The Chief Information Officer Group is responsible for ensuring that Defence has a dependable, secure and integrated ICT environment that supports Defence business and military

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

Privacy Policy. You may exercise your rights by sending a registered mail to the Privacy Data Controller.

Privacy Policy. You may exercise your rights by sending a registered mail to the Privacy Data Controller. Privacy Policy Revision date: April, 26th 2018 Privacy and security of personal data are of utmost importance to epresspack and we strive to ensure that our technical and organisational measures we have

More information

Data Breach Notification: what EU law means for your information security strategy

Data Breach Notification: what EU law means for your information security strategy Data Breach Notification: what EU law means for your information security strategy Olivier Proust December 8, 2011 Hunton & Williams LLP Key points 1. Introduction 2. Overview of data breach requirements

More information