Help

Protecting Data & Dealing with Breaches Globally in 2017

Best practices for local and multi-location businesses

  • Product Number: 2170183P01
  • CLE Credits, earn up to:
    3 substantive credits, 0 ethics credits CLE Credit Note
  • Add to Favorites List

Choose Date/Location:

Registration for this program is closed
  • Product Description
  • Agenda & Materials
  • Faculty
  • Product Description

    Product Description

    The continuing explosion of data security issues locally, nationally, and internationally created new challenges for Massachusetts businesses. It is no longer optional to have a working understanding of the critical need to protect competitively and personally sensitive data from theft or accidental disclosure. Massachusetts’ State Information Security Rules (201 CMR 17.00) are arguably the toughest in the nation. And the evolving set of state and federal laws, including regulatory and litigation developments, add another layer of complexity—further compounded by global developments, including an entirely new Europe-U.S. data security regime and a continued ramping up of overseas threats to locally based data.

    This program provides a comprehensive overview of data security developments affecting Massachusetts businesses and institutions in 2017. The faculty focus on the key legal and operational measures that should be encompassed in any effective information security program—with new emphasis this year on global issues, recent litigation precedents affecting exposure to class action lawsuits for significant breaches, and emerging insurance coverage issues. The panel also provides a timely update on recent enforcement trends and the evolving roles of the Consumer Protection Division of the Massachusetts Attorney General’s Office as reviewers of business practices and protectors of consumer rights relative to sensitive data.

    • Potentially Applicable Data Security Laws and Key Recent Developments for Each
    • Factors and Risk Areas Considered During an Information Security Audit
    • Key IT and Operational Protections Needed to Limit Risk of Intentional Theft or Inadvertent Disclosures of Sensitive Data
    • The Data Breach “Kill Chain” and Best Practices to Prevent or Detect Potential Problems at Each Stage
    • Key IT Measures to Address Global Threats
    • Top Signs That YoMay Need to Review Your Current Program
    • Creating an Effective WISP
    • Best Practices for Data Breach Preparation and Response
    • Recent Developments in State, U.S., and Global Data Protection and Enforcement—and the Outlook Ahead
    • Overview of Breach-Related Litigation Risks and Recent Developments
    • Update on Current State of Breach-Related Insurance Coverage Issues
    • AG’s Office Suggested Practices in Consumer Disclosures and Emerging Data Security Risks and Threats That Require Attention, Including Global Concerns
    • “Ask the Experts” Q&A Session
  • Agenda

    Agenda & Materials

    Please Note

    MCLE webcasts are delivered completely online, underscoring their convenience and appeal. There are no published print materials. All written materials are available electronically only. They are posted 24 hours prior to the program and can be accessed, downloaded, or printed from your computer.

  • Faculty
TOP