ANTICIPATE. MITIGATE. PROTECT.

Similar documents
BHConsulting. Your trusted cybersecurity partner

Take A Quick Tour introductory tour of the Resource Center in Adobe Flash.

INTERNET LAW RESOURCE CENTER

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Breach Notifications: How to Handle Breaches Across Jurisdictions. Moderated by: Zach Warren, Editor-in-Chief, Legaltech News

News & Commentary Access the titles included in your subscription.

BHConsulting. Your trusted cybersecurity partner

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

EU General Data Protection Regulation (GDPR) Achieving compliance

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Try Lexis Practice Advisor today. Lexis Practice Advisor Quick Reference Guide

EHS RegTracker. User Guide. (800)

The Resilient Incident Response Platform

Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

Cyber Security: Threat and Prevention

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

Data Privacy and Cybersecurity

Protecting your data. EY s approach to data privacy and information security

RISK MANAGEMENT Education and Certification

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Risk Advisory Academy Training Brochure

Creating Value With GDPR

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

Accelerate GDPR compliance with the Microsoft Cloud

The First Annual Privacy & Data Protection SOUTH AFRICA 2016

BNA s Intellectual Property Library

VMworld 2015 Track Names and Descriptions

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

Incident Response Services

Three Key Challenges Facing ISPs and Their Enterprise Clients

Secure Societies Work Programme Call

The GDPR Are you ready?

PROJECT BACKGROUND AND RATIONALE

M&A Cyber Security Due Diligence

Sage Data Security Services Directory

INSIDE. 2 Introduction 15 Conclusion 4 Cyber: A Top-of-Mind Concern A Message From Morrison & Foerster s Global Privacy & Data Security Chair

VMworld 2015 Track Names and Descriptions

TRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Perfect Balance of Public and Private Cloud

Legal and Regulatory Developments for Privacy and Security

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

CYBER SOLUTIONS & THREAT INTELLIGENCE

Caribbean Cyber Security: Not Only Government s Responsibility

Data Privacy & Protection

Achieving effective risk management and continuous compliance with Deloitte and SAP

IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

Developing your GDPR response for competitive advantage. EU General Data Protection Regulation (GDPR)

NOW IS THE TIME. to secure our future

MITIGATE CYBER ATTACK RISK

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity in Higher Ed

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Best Practices in Securing a Multicloud World

Advising the C-Suite and Boards of Directors on Cybersecurity. February 11, 2015

Hacking and Cyber Espionage

European Union Agency for Network and Information Security

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Empowering Business Adoption of the Cloud through Intelligent Security Solutions and Active Defense Platforms

GDPR: A QUICK OVERVIEW

PREPARING FOR THE GDPR AT THE UNIVERSITY OF HELSINKI

EY s data privacy service offering

Mastering Data Privacy, Social Media, & Cyber Law

Cybersecurity. Securely enabling transformation and change

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia. Bernie Trudel Chairman, Asia Cloud Computing Association

DATACENTER SERVICES DATACENTER

GDPR COMPLIANCE REPORT

How to Take Advantage of the Cloud for ediscovery

EY s data privacy service offering. How to transform your data privacy capabilities for an EU General Data Protection Regulation (GDPR) world

BUILT FOR THE STORM. AND THE NORM.

SEC Issues Updated Guidance on Cybersecurity Disclosure

Accelerate Your Enterprise Private Cloud Initiative

CyberEdge. End-to-End Cyber Risk Management Solutions

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions.

General Data. Protection Regulations MAY Martin Chapman Head of Ops & Sales Microminder. Presentation Micro Minder Ltd 2017

MODERNIZE INFRASTRUCTURE

Cyber Risks in the Boardroom Conference

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Demonstrating data privacy for GDPR and beyond

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

How to Navigate International Privacy and Data Security Developments Beyond the US and the EU, Namely Canada January 30, 2019

There have been several changes to IDEA since it was passed in The MDE-OSE has regularly issued new policies to address changes in Federal regul

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

reach Cross-Border Data: Managing the Risks People. Partnership. Performance.

HPH SCC CYBERSECURITY WORKING GROUP

Keeping It Under Wraps: Personally Identifiable Information (PII)

Transcription:

ANTICIPATE. MITIGATE. PROTECT. FROM ESSENTIAL NEWS AND EXPERT ANALYSIS TO TOOLS THAT HELP YOU MAP YOUR STRATEGIES, BLOOMBERG LAW: PRIVACY & DATA SECURITY DELIVERS. Stay Connected #BloombergLaw @BloombergLaw

ANALYSIS DEFINE YOUR VISION. CRAFT YOUR PLAN. Access the EU GDPR Developments tool to get the latest analysis, guidance, legislative history, and industry scrutiny on this critical regulation. The story of privacy and data security is about more than just machines and information. It s a story of changing connections between individuals, groups, and society. It s about the boundaries between public and private and the gray areas in between. It is about information and the ways it is protected, moved, stored, used, or revealed. Understanding these shifting realities and nuanced aspects is essential to serving clients, developing solutions, and focusing a vision to take the lead. Dive deep with unrivaled expertise to define your strategy. Leading voices on privacy and data security law Understand the impacts of new regulations, laws, and enforcement actions with commentary and analysis by newsmakers themselves on privacy and cybersecurity issues in the U.S. and around the world. Our comprehensive coverage includes insights from advisory board members and thought leaders who help you stay focused on what matters. A long tradition of expertise Bloomberg Law: Privacy & Data Security draws on institutional experience to inform your practice and business. We bring sources and voices to the forefront so you will understand the regulations, laws, and complex regulatory landscape, as well as the implications to your clients business. Access our collection of portfolios offering insight and guidance from leading privacy and data security authorities. Written by expert practitioners, titles include Cybersecurity and Privacy in Business Transactions: Managing Data Risk in Deals and Cross-Border Data Transfers. Treatise titles provide expert practitioner insights and guidance to help you make sound decisions and plan with confidence. Titles include Practical Guide to the Red Flag Rules: Identifying and Addressing Identity Theft Risks and Cyber Liability in the Age of the New Data Security Laws. Quickly zero in on the hottest areas of privacy and data security law based on topics covered in our industry-leading notifications. It s a whole new world. Here s your compass.

NEWS STAY IN THE KNOW. NO MATTER WHERE YOU ARE. On the frontier of privacy and data security, everything is always changing. One enforcement action, breach, or class action suit could shift the landscape entirely. With changing and new technologies come new risks and responsibilitiesalong with new laws and regulations. Read the privacy and data security story as it unfolds. Get real-time reporting on happenings at home. From data hacking to the Internet of Things and everything in between Bloomberg Law: Privacy & Data Security draws on a global network of reporters covering data, security, and the changing laws and regulations as they develop. Our reporters deliver real-time news with context and insights direct from the sources making the headlines so you get the full picture. We ve got U.S. data and privacy news covered, so you can cover your bases. Data crosses borders. So does our coverage. You need instantaneous news from countries around the world. You need to understand regulations that might affect your practice, your clients, and their businesses. Bloomberg Law: Privacy & Data Security includes news and commentary on privacy and cybersecurity issues from across the U.S. and around the world with Bloomberg Law s premier news services Privacy Law Watch and World Data Protection Report.

Plan for what s next and get a firsthand look at new laws with Upcoming Enactments charts that help you know what s on the horizon. Includes links to related news, Country Profiles, and statutes affected. Country Profiles Assembled by a team of international privacy and data security experts, access detailed content, including detailed analysis of the Risk Environment, that helps you answer questions about the privacy and data security landscape of a given country.

TOOLS UNDERSTAND THE GLOBAL IMPACT OF CHANGE. Chart Builders Save time with exclusive, easy-to-use chart builders to quickly compare varying laws and requirements across multiple states and countries. Build charts by jurisdiction and topic for domestic breach notifications and medical records requirements and internationally for Global Workplace Privacy and Data Protection by country and topic. Medical Privacy Chart Builders include Medical Record Access, Retention and Disposal, Disclosure of Medical Information, and Special Protections for Sensitive Health Information. All charts can be exported into Excel for quick sorting, note-taking, and sharing with colleagues and clients. Keeping up with the speed of change means understanding what is happening today, anticipating what is happening tomorrow, and transforming knowledge into action. Utilize fully integrated tools, data, and primary sources that span the whole world and that you can customize. Whether you re growing your existing privacy and data security legal practice or looking to enter this exciting new marketplace, Bloomberg Law: Privacy and Data Security has the practical guidance and tools to turn your strategy into action with connected primary sources, chart builders, and customizable search tools and global intelligence. Quickly compare laws in different states and globally. Save time with exclusive, easy-to-use chart builders to quickly compare varying laws and requirements across multiple states and countries. Build charts by jurisdiction and topic for domestic Breach Notifications and Medical Records requirements and internationally for Global Workplace Privacy and Data Protection by country and topic. Access a one-stop shop of international regulations, risks, and forecasts. Start your research with dozens of country profiles including relevant privacy statutes and regulations, strategic overviews of countries risk environments, emerging issues, regulatory frameworks, and outlooks. Understand local interpretations of these laws to help you advise clients, communicate with business partners, and sharpen your competitive edge. Get guidance to elevate your practice. In Practice tools include exemplar policies and provisions, checklists, and forms to facilitate your drafting needs for privacy and data security tasks such as: Managing a data breach Managing privacy and data security risk in mergers and acquisitions Designing a privacy policy

NAVIGATE A NEW WORLD WITH CONFIDENCE AND EXPERTISE. START NOW LEARN MORE www.bna.com/bloomberg-law-privacy-data-security SUPERIOR 24/7 CUSTOMER SUPPORT 888.560.2529 blawhelp@bna.com bloomberglaw.com STAY CONNECTED 2016 The Bureau of National Affairs, Inc. 0416-JO19227 04-1209