U.S. Cybersecurity Law

$199.00

SKU: 407874

Description

Understand the United States cybersecurity laws and how to protect your clients.
Clients are focused on how their personal information is being handled and computer breaches are commonplace. Whether your client is a large internet presence like LinkedIn, a prestigious law firm such as Mossack Fonseca of Panama Papers fame, or even a major political party such as the Democratic National Committee, they are not immune from cyber attacks. If a breach occurs, your clients will need guidance as their next steps. Virtually every state now has notification laws on the books dictating who must get notice when a data breach occurs. California is leading the way on data privacy for consumers. This topic will bring you up to speed as to the most current notification requirements and the direction of data privacy so that your clients interests can be protected in the event of a compromise. This information is the who, what, where and when for data privacy and data breach notification.

Date: 2020-08-19 Start Time: 1:00 PM ET End Time: 2:30 PM ET

Learning Objectives

The General State of Data Protection Laws
• Overview of the Data Privacy/Security Landscape
• Data Breach Notification Laws
• Data Privacy Laws
• Basic Principles
• Privacy as a Human Right
• Privacy as a Statutory Right
• Rights

Data Privacy Laws
• California Consumer Privacy Act
• Basic Principles (Rights Protected)
• Personally Identifying Information
• Other Sensitive Data: Personal Health Information (PHI), Personal Financial Information (PFI), Business Data
• What Rights Are Protected Under CCPA
• Other Privacy Laws
• GDPR
• PIPEDA
• Rest of the World
• Obligations Under Privacy
• Practical Steps for Compliance
• Identify
• Data Subject Access Requests
• Access
• Correct
• Delete
• Block
• Secure Disposal
• Ramifications of Noncompliance
• Administrative Prosecution
• Safe Harbor or 30-Day Notice
• Private Right of Action
• Business Risk

Data Breach Notification Laws
• What Constitutes a Data Breach?
• Common Misconceptions
• Covered Data
• Examples of Breaches
• Who is Covered by DBNL?
• Who Must Give Notice?
• Who Must Get Notice?
• Breach Notice
• Who Must Get Notice?
• Content of Notice
• Timing of Notice
• Miscellaneous Notes
• Delay Due to Law Enforcement Involvement
• Safe Harbor Requirements (Good Faith Exception)
• Administrative Penalties
• Potential Private Right of Action
• Evidence Preservation

Conclusions

CLE (Please check the Detailed Credit Information page for states that have already been approved) ,NALA ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Patrick T. Cronin, Esq.-Eastern Computer Forensics