SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Privacy Law Developments Handling the sensitive personal information of others. A high stakes venture.
Hypothetical Your office is broke into and several company files and company computers are stolen… Sensitive personal information (“SPI”) of your customers is included in these files/computers…
Bummer… Legal Problems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Nevada 1.  Current law was enacted on October 1, 2008 and requires that  “a  business in this state” must encrypt personal information of a  customer prior to transmission.  On January 1, 2010 law will be  expanded to also require encryption when data storage devices  containing SPI are moved beyond the physical controls of the  business. 2.  The law does not define “business in this state”, nor does it define  “customer” or “personal information”.. . so we do not know  whether these definitions are limited to Nevada residents.   Therefore, the law appears very broad on its face. 3.  Encryption is defined broadly  as  “the use of any protective or  disruptive measure, including, without limitation, cryptography,  enciphering,  encoding or a computer contaminant, to:   A. Prevent, impede, delay or disrupt access to any data, information,  image, program, signal or sound;   B. Cause or make any data, information, image, program, signal or sound  unintelligible or unusable; or   C. Prevent, impede, delay or disrupt the normal operation or use of any  component, device, equipment, system or network.”
Connecticut ,[object Object],[object Object],[object Object],[object Object],[object Object]
Massachusetts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks of non-compliance ,[object Object],[object Object],[object Object],[object Object]
Real Risk is the Damage to Brand Image: What is the value of your brand’s image? “ I t takes many good deeds to build a good reputation, and only one bad one to lose it.” -Benjamin Franklin
Security Breach = Brand Damage In today’s world, handling people’s sensitive personal information can be a high stakes venture.
Best Privacy Practices 1. Review the SPI of individuals which you are collecting information from  and the residencies of those individuals. 2. Is it necessary to both collect and store the SPI? Or, to electronically transfer the information? 3. If so, where do you store the SPI? Do you send the SPI to any third parties?  4. Review your Privacy Policy to make sure it is consistent with your business practice of collecting and storing data. 5. Take inventory of how the data is protected.  Should it be encrypted?  6. Do you have a “comprehensive information security plan?” How about third parties with access to the SPI?
David Mink Dream Systems Media, Owner/Counsel http://www.dreamsystemsmedia.com @dmmink  on Twitter

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill Komal Gadia
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsJulia Mak
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?Bivas Chatterjee
 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspectiveAnn Treacy
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 

Was ist angesagt? (20)

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data protection act
Data protection act Data protection act
Data protection act
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy Regulations
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?
 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspective
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 

Ähnlich wie Pubcon Privacy Legal Presentation by David Mink

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperMatthew Kurnava
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfRiley Claire
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 

Ähnlich wie Pubcon Privacy Legal Presentation by David Mink (20)

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 

Mehr von Matt Siltala

How to create the best content in the world
How to create the best content in the worldHow to create the best content in the world
How to create the best content in the worldMatt Siltala
 
EngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXEngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXMatt Siltala
 
Getting the most milage out of your content marketing
Getting the most milage out of your content marketingGetting the most milage out of your content marketing
Getting the most milage out of your content marketingMatt Siltala
 
Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Matt Siltala
 
Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Matt Siltala
 
Being Influenced - EngagePDX
Being Influenced - EngagePDXBeing Influenced - EngagePDX
Being Influenced - EngagePDXMatt Siltala
 
Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Matt Siltala
 
King of the Brand - State of Search 2016
King of the Brand - State of Search 2016King of the Brand - State of Search 2016
King of the Brand - State of Search 2016Matt Siltala
 
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Matt Siltala
 
The 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingThe 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingMatt Siltala
 
Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Matt Siltala
 
Advanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedAdvanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedMatt Siltala
 
Guide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsGuide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsMatt Siltala
 
How to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingHow to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingMatt Siltala
 
Use visuals and win at social media
Use visuals and win at social mediaUse visuals and win at social media
Use visuals and win at social mediaMatt Siltala
 
Brand Building with Social Media
Brand Building with Social Media Brand Building with Social Media
Brand Building with Social Media Matt Siltala
 
Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Matt Siltala
 
SFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentSFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentMatt Siltala
 
Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Matt Siltala
 
Brand Building with Creative Visual Content
Brand Building with Creative Visual ContentBrand Building with Creative Visual Content
Brand Building with Creative Visual ContentMatt Siltala
 

Mehr von Matt Siltala (20)

How to create the best content in the world
How to create the best content in the worldHow to create the best content in the world
How to create the best content in the world
 
EngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXEngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAX
 
Getting the most milage out of your content marketing
Getting the most milage out of your content marketingGetting the most milage out of your content marketing
Getting the most milage out of your content marketing
 
Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101
 
Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?
 
Being Influenced - EngagePDX
Being Influenced - EngagePDXBeing Influenced - EngagePDX
Being Influenced - EngagePDX
 
Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content
 
King of the Brand - State of Search 2016
King of the Brand - State of Search 2016King of the Brand - State of Search 2016
King of the Brand - State of Search 2016
 
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
 
The 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingThe 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content Marketing
 
Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically
 
Advanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedAdvanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX Advanced
 
Guide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsGuide to Local Search Marketing for Contractors
Guide to Local Search Marketing for Contractors
 
How to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingHow to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketing
 
Use visuals and win at social media
Use visuals and win at social mediaUse visuals and win at social media
Use visuals and win at social media
 
Brand Building with Social Media
Brand Building with Social Media Brand Building with Social Media
Brand Building with Social Media
 
Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016
 
SFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentSFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad Content
 
Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide
 
Brand Building with Creative Visual Content
Brand Building with Creative Visual ContentBrand Building with Creative Visual Content
Brand Building with Creative Visual Content
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Pubcon Privacy Legal Presentation by David Mink

  • 1. Privacy Law Developments Handling the sensitive personal information of others. A high stakes venture.
  • 2. Hypothetical Your office is broke into and several company files and company computers are stolen… Sensitive personal information (“SPI”) of your customers is included in these files/computers…
  • 3.
  • 4. Nevada 1. Current law was enacted on October 1, 2008 and requires that “a business in this state” must encrypt personal information of a customer prior to transmission. On January 1, 2010 law will be expanded to also require encryption when data storage devices containing SPI are moved beyond the physical controls of the business. 2. The law does not define “business in this state”, nor does it define “customer” or “personal information”.. . so we do not know whether these definitions are limited to Nevada residents. Therefore, the law appears very broad on its face. 3. Encryption is defined broadly as “the use of any protective or disruptive measure, including, without limitation, cryptography, enciphering, encoding or a computer contaminant, to: A. Prevent, impede, delay or disrupt access to any data, information, image, program, signal or sound; B. Cause or make any data, information, image, program, signal or sound unintelligible or unusable; or C. Prevent, impede, delay or disrupt the normal operation or use of any component, device, equipment, system or network.”
  • 5.
  • 6.
  • 7.
  • 8. Real Risk is the Damage to Brand Image: What is the value of your brand’s image? “ I t takes many good deeds to build a good reputation, and only one bad one to lose it.” -Benjamin Franklin
  • 9. Security Breach = Brand Damage In today’s world, handling people’s sensitive personal information can be a high stakes venture.
  • 10. Best Privacy Practices 1. Review the SPI of individuals which you are collecting information from and the residencies of those individuals. 2. Is it necessary to both collect and store the SPI? Or, to electronically transfer the information? 3. If so, where do you store the SPI? Do you send the SPI to any third parties? 4. Review your Privacy Policy to make sure it is consistent with your business practice of collecting and storing data. 5. Take inventory of how the data is protected. Should it be encrypted? 6. Do you have a “comprehensive information security plan?” How about third parties with access to the SPI?
  • 11. David Mink Dream Systems Media, Owner/Counsel http://www.dreamsystemsmedia.com @dmmink on Twitter