Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016

Similar documents
Developing and Implementing Data Protection Law: Malaysia and Beyond

Safeguards on Personal Data Privacy.

Technology and data privacy Global perspectives

2014 Luxury & Fashion Industry Conference for Multinationals

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

Link Group Privacy Policy LINK GROUP. For all subsidiaries of the Link Group in Australia. Privacy Policy. LINK Group, 2017 Page 1 of 11

Cyber Attack: Is Your Business at Risk?

20/09/2013. Global Privacy and Data Protection: Practical Risk Assessment and Governance. Topics

Security Breach Notification Reflections on the U.S. Experience

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia. Bernie Trudel Chairman, Asia Cloud Computing Association

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.

Enterprise with Integrity

Cybercrime Criminal Law Definitions and Concepts

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Hong Kong s Personal Data (Privacy) Ordinance

DATA PROTECTION AND PRIVACY POLICY

DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES

2.1 The type of personal information that auda collects about you depends on the type of dealings you have with us. For example, if you:

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.

Workday s Robust Privacy Program

Acceptable Use and Publishing Policy

PTLGateway Acceptable Use Policy

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

It s still very important that you take some steps to help keep up security when you re online:

Data Protection Privacy Notice

Outline of AFIT Member Countries/Regions Data on Information Security. AFIT Secretariat February 19, 2009

HAGA CLICK AQUÍ PARA TRADUCCION AL ESPAÑOL DE LA POLÍTICA DE PRIVACIDAD

2017 RIMS CYBER SURVEY

UNIFIED CARRIER LICENCE TELECOMMUNICATIONS ORDINANCE (Chapter 106)

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

Role Type Pay Band Location Duration Reports to:

DATA PROTECTION LAWS OF THE WORLD. Bahrain

Jeff Wilbur VP Marketing Iconix

What To Do When Your Data Winds Up Where It Shouldn t

DLB Privacy Policy. Why we require your information

Upcoming PIPEDA Changes What is changing and what to do about it

InComm Australia & New Zealand Pty Ltd Privacy Policy (AUSTRALIA)

Forum. Ningbo, China 25 February

ADMA Briefing Summary March

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

Data Breach Notification: what EU law means for your information security strategy

China and International Governance of Cybercrime

MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY

PRIVACY POLICY. Personal Information We Collect

Send a signed and completed copy to your Telstra Representative. For further assistance please contact your Telstra Representative.

Trough a cyber security lens

FLIPOUT Privacy Charter. We will handle any information we collect about you in accordance with our privacy Policy

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR)

The APEC Model. Global Partnership through Regional Initiatives

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

University Privacy Campaign. Introduction to the Personal Data (Privacy) Ordinance

The people team manage recruitment, retention and HR functions. The facilities team oversee the management of Countrywide buildings and sites

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk

Privacy Policy. Revisions to this Policy. What Information we collect. How do we collect Information?

Subject: Kier Group plc Data Protection Policy

SECURITY STATE OF THE INDUSTRY

Public Safety Working Group (PSWG)

PRIVACY NOTICE WHO WILL PROCESS YOUR PERSONAL INFORMATION? WHY IS YOUR PERSONAL INFORMATION REQUIRED?

8. AUTOMATED DECISION MAKING DURING DATA PROCESSING FURTHER INFORMATION FURTHER INFORMATION AND GUIDANCE CONTACT US...

Cybersecurity and Nonprofit

Internet Service Provider Agreement

Managing Data Breaches: The PDPA Perspective

Toyota Group - Privacy and Credit Information Policy Updated 27 February 2017

NIPPON VALUE INVESTORS DATA PROTECTION POLICY

The Data Breach: How to Stay Defensible Before, During & After the Incident

GENERAL PRIVACY POLICY

Privacy Policy KPMG Australia

Privacy Policy Wealth Elements Pty Ltd

Cyber Risks in the Boardroom Conference

LCU Privacy Breach Response Plan

Legal Aspects of Cybersecurity

Introduction to the Personal Data (Privacy) Ordinance

PRIVACY POLICY. What personal data we collect and why we collect it IN ORDER TO: (Date of last update: 1 st January 2019)

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1

Data Privacy for Multinationals: How to Build and Implement a Compliance Plan

Putting It All Together:

Purchasing. Operations 3% Marketing 3% HR. Production 1%

Global Privacy and Data Protection Risk:

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

Introduction to the Personal Data (Privacy) Ordinance

Privacy & Cookie Policy

Information on labelling and record-keeping Introduction devices

Data Privacy for Multinationals: How to Build and Implement a Compliance Plan

CYBERCRIMES IN THE UAE PHISHING, HACKING AND DATA LEAKS

The United Nations Convention On the Use of Electronic Communication in International Contracts, 2005 and Electronic Transactions Law in Thailand

Dealing with Security and Security Breaches

Supplier Responding to New Products RFP Event

Government data matching and the Privacy Act 1988 (Cth)

Jane Nishida and participants of Group D

Privacy Policy. Effective as of October 5, 2017

Terms and Conditions for External accounts Service

Transcription:

Data and Cyber Crisis how to manage a crisis and reduce loss Melissa Russell Special Counsel February 2016

Introduction cyber risks

Most commonly reported types of economic crime from PwC

The causes and consequences of cybercrime committed by insiders* from PwC

Personal Data Collection in New Zealand

Who is collection data for you? Who is storing data for you? Phone enquiries complaints and change of details Council websites cookies Application forms dog registration to a building application Elections forms Surveys of land and reports How valuable is your system? What criminals want name, DOB, bank card number

Law and regulation on the increase Information Technology Act 2000 and Information and Technology Rules 2011 India The Personal Data Protection Act 2010 & Malaysia Computer Crimes Act 1997 and The Communications Act 1998 Civil Law and specific rules/ordinances of each Province Constitution of Thailand Indonesia Malaysia PR China Thailand Singapore Hong Kong South Korea Taiwan Philippines Japan Personal Data Protection Act 2012 and Computer Misuse and Cyber Security Act 1993 Act on the Promotion of Information and Communications Network Utilization and Information Protection 2001 and Use and Protection of Credit Information Act 1995 Personal Information Protection Act 2011 The Act on the Protection of Personal Information 2003 and The Act on The Prohibition of Unauthorized Computer Access 1999 Personal Information Protection Act 2010 Personal Data (Privacy) Ordinance Amended October 2012 & Computer Crimes Ordinance 1993 The Philippines Data Privacy Act of 2012 and Cyber Crime Prevention Act 2012 1945 Constitution of Indonesia Electronic Information and Transaction Act Australia New Zealand Cyber Crime Act 2001 Criminal Code Act Privacy Act 1993 Australian Privacy Charter Telecommunications Act 1997 Do Not Call Register Act 2007 Spam Act 2003 Corporations Act 2001 Privacy Act 1993 Crimes Act 1961 Unsolicited Electronic Messages Act 2007

Connecting the Dots - recent cyber loss examples

In the Media The Fire Service says a "lapse of judgement" by two staff members caused it to lose $52,000 in a scam last month Finance boss at Te Wananga o Aotearoa falls for 'whaling' scam Kiwi finance bosses have fallen for 'spoofed' emails from bosses, MPA believes

Claims examples Losing a memory stick Client data Employment related issues Denial of Access Business interruption Reputation loss Extortion Payment Forensic analysis

Legal Obligations in the event of a cyber crime Page 11

Data collection and privacy laws Now 12 privacy principles Damages up to $200,000 Costs awards Guidelines recommend self reporting Self administration Connect Smart a government initiative including the ORB 2016 12 privacy principles Damages increased Court costs Compliance notice power Mandatory reporting Naming and Shaming register Regulatory cyber body?

Internal vs External Harmful Digital Communications Act 2015 New criminal offence for worst offenders: causing harm by posting digital communication (s22) Requires: Intention to cause harm. Also an objective test ( ordinary reasonable person in the position of the victim ). Communication must have actually caused harm. Maximum penalties: Individual: imprisonment for up to 2 years or $50,000 fine. Corporate: $200,000 fine. Companies Act 1993 Local Government Act 2002

Laws to use as a shield or a sword Unsolicited Electronic Messages Act 2007 Crimes Act 1961 S 249 - Accessing computer system for dishonest purpose S 250 - Damaging or interfering with computer system S 251 - Making, selling, or distributing or possessing software for committing crime S252 - Accessing computer system without authorisation Privacy Act 1993 Employment laws Payment Card Industry Data Security Standard Injunctions Search and seizure orders Damages

What steps can you take or do you take?

Mitigation Options Your IT systems and equipment Your IT department Contracts with service providers / contractors Contracts with employees In-house procedures and manuals Insurance Paper - less

Mitigation Options Crisis team Public Relations Computer Forensics Data storage Lawyers and accountants What do you have in place? 24 hours? World wide?

Ask a question! Melissa Russell Special Counsel +64 (0)9 3367643