SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Privacy Law Developments Handling the sensitive personal information of others. A high stakes venture.
Hypothetical Your office is broke into and several company files and company computers are stolen… Sensitive personal information (“SPI”) of your customers is included in these files/computers…
Bummer… Legal Problems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Nevada 1.  Current law was enacted on October 1, 2008 and requires that  “a  business in this state” must encrypt personal information of a  customer prior to transmission.  On January 1, 2010 law will be  expanded to also require encryption when data storage devices  containing SPI are moved beyond the physical controls of the  business. 2.  The law does not define “business in this state”, nor does it define  “customer” or “personal information”.. . so we do not know  whether these definitions are limited to Nevada residents.   Therefore, the law appears very broad on its face. 3.  Encryption is defined broadly  as  “the use of any protective or  disruptive measure, including, without limitation, cryptography,  enciphering,  encoding or a computer contaminant, to:   A. Prevent, impede, delay or disrupt access to any data, information,  image, program, signal or sound;   B. Cause or make any data, information, image, program, signal or sound  unintelligible or unusable; or   C. Prevent, impede, delay or disrupt the normal operation or use of any  component, device, equipment, system or network.”
Connecticut ,[object Object],[object Object],[object Object],[object Object],[object Object]
Massachusetts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks of non-compliance ,[object Object],[object Object],[object Object],[object Object]
Real Risk is the Damage to Brand Image: What is the value of your brand’s image? “ I t takes many good deeds to build a good reputation, and only one bad one to lose it.” -Benjamin Franklin
Security Breach = Brand Damage In today’s world, handling people’s sensitive personal information can be a high stakes venture.
Best Privacy Practices 1. Review the SPI of individuals which you are collecting information from  and the residencies of those individuals. 2. Is it necessary to both collect and store the SPI? Or, to electronically transfer the information? 3. If so, where do you store the SPI? Do you send the SPI to any third parties?  4. Review your Privacy Policy to make sure it is consistent with your business practice of collecting and storing data. 5. Take inventory of how the data is protected.  Should it be encrypted?  6. Do you have a “comprehensive information security plan?” How about third parties with access to the SPI?
David Mink Dream Systems Media, Owner/Counsel http://www.dreamsystemsmedia.com @dmmink  on Twitter

Contenu connexe

Tendances

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill Komal Gadia
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsJulia Mak
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?Bivas Chatterjee
 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspectiveAnn Treacy
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 

Tendances (20)

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data protection act
Data protection act Data protection act
Data protection act
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy Regulations
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?
 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspective
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 

Similaire à Pubcon Privacy Legal Presentation by David Mink

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Computer Misuse Act By Robert Schifreen And Stephen Gold
Computer Misuse Act By Robert Schifreen And Stephen GoldComputer Misuse Act By Robert Schifreen And Stephen Gold
Computer Misuse Act By Robert Schifreen And Stephen GoldFelicia Barker
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
The Data Protection Act, 1998 Essay
The Data Protection Act, 1998 EssayThe Data Protection Act, 1998 Essay
The Data Protection Act, 1998 EssayAngela Gibbs
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
P5 – Explain The Legal And Ethical Issue In Relation To...
P5 – Explain The Legal And Ethical Issue In Relation To...P5 – Explain The Legal And Ethical Issue In Relation To...
P5 – Explain The Legal And Ethical Issue In Relation To...Erika Nelson
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperMatthew Kurnava
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
 
The Purpose Of Data Protection Act
The Purpose Of Data Protection ActThe Purpose Of Data Protection Act
The Purpose Of Data Protection ActRebecca Diamond
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
 

Similaire à Pubcon Privacy Legal Presentation by David Mink (20)

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Computer Misuse Act By Robert Schifreen And Stephen Gold
Computer Misuse Act By Robert Schifreen And Stephen GoldComputer Misuse Act By Robert Schifreen And Stephen Gold
Computer Misuse Act By Robert Schifreen And Stephen Gold
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
The Data Protection Act, 1998 Essay
The Data Protection Act, 1998 EssayThe Data Protection Act, 1998 Essay
The Data Protection Act, 1998 Essay
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
P5 – Explain The Legal And Ethical Issue In Relation To...
P5 – Explain The Legal And Ethical Issue In Relation To...P5 – Explain The Legal And Ethical Issue In Relation To...
P5 – Explain The Legal And Ethical Issue In Relation To...
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
The Purpose Of Data Protection Act
The Purpose Of Data Protection ActThe Purpose Of Data Protection Act
The Purpose Of Data Protection Act
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 

Plus de Matt Siltala

How to create the best content in the world
How to create the best content in the worldHow to create the best content in the world
How to create the best content in the worldMatt Siltala
 
EngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXEngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXMatt Siltala
 
Getting the most milage out of your content marketing
Getting the most milage out of your content marketingGetting the most milage out of your content marketing
Getting the most milage out of your content marketingMatt Siltala
 
Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Matt Siltala
 
Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Matt Siltala
 
Being Influenced - EngagePDX
Being Influenced - EngagePDXBeing Influenced - EngagePDX
Being Influenced - EngagePDXMatt Siltala
 
Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Matt Siltala
 
King of the Brand - State of Search 2016
King of the Brand - State of Search 2016King of the Brand - State of Search 2016
King of the Brand - State of Search 2016Matt Siltala
 
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Matt Siltala
 
The 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingThe 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingMatt Siltala
 
Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Matt Siltala
 
Advanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedAdvanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedMatt Siltala
 
Guide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsGuide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsMatt Siltala
 
How to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingHow to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingMatt Siltala
 
Use visuals and win at social media
Use visuals and win at social mediaUse visuals and win at social media
Use visuals and win at social mediaMatt Siltala
 
Brand Building with Social Media
Brand Building with Social Media Brand Building with Social Media
Brand Building with Social Media Matt Siltala
 
Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Matt Siltala
 
SFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentSFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentMatt Siltala
 
Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Matt Siltala
 
Brand Building with Creative Visual Content
Brand Building with Creative Visual ContentBrand Building with Creative Visual Content
Brand Building with Creative Visual ContentMatt Siltala
 

Plus de Matt Siltala (20)

How to create the best content in the world
How to create the best content in the worldHow to create the best content in the world
How to create the best content in the world
 
EngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAXEngagePDX Leverage your visual content to the MAX
EngagePDX Leverage your visual content to the MAX
 
Getting the most milage out of your content marketing
Getting the most milage out of your content marketingGetting the most milage out of your content marketing
Getting the most milage out of your content marketing
 
Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101 Being Influenced - Influencer Marketing 101
Being Influenced - Influencer Marketing 101
 
Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?Are you a content creator, or a content documenter?
Are you a content creator, or a content documenter?
 
Being Influenced - EngagePDX
Being Influenced - EngagePDXBeing Influenced - EngagePDX
Being Influenced - EngagePDX
 
Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content Pubcon SFIMA - Integrating Content
Pubcon SFIMA - Integrating Content
 
King of the Brand - State of Search 2016
King of the Brand - State of Search 2016King of the Brand - State of Search 2016
King of the Brand - State of Search 2016
 
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016Content Marketing Trends 2016-2017 Pubcon Vegas 2016
Content Marketing Trends 2016-2017 Pubcon Vegas 2016
 
The 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content MarketingThe 2016 - 2017 Guide to Visual Content Marketing
The 2016 - 2017 Guide to Visual Content Marketing
 
Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically Guide to dominate on Pinterest Organically
Guide to dominate on Pinterest Organically
 
Advanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX AdvancedAdvanced Content for SEO - SMX Advanced
Advanced Content for SEO - SMX Advanced
 
Guide to Local Search Marketing for Contractors
Guide to Local Search Marketing for ContractorsGuide to Local Search Marketing for Contractors
Guide to Local Search Marketing for Contractors
 
How to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketingHow to be dope online - A guide to visual marketing
How to be dope online - A guide to visual marketing
 
Use visuals and win at social media
Use visuals and win at social mediaUse visuals and win at social media
Use visuals and win at social media
 
Brand Building with Social Media
Brand Building with Social Media Brand Building with Social Media
Brand Building with Social Media
 
Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016Link Building Fundamentals SMX West 2016
Link Building Fundamentals SMX West 2016
 
SFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad ContentSFIMA Pubcon Super Content vs Bad Content
SFIMA Pubcon Super Content vs Bad Content
 
Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide Pinterest Marketing Survival Guide
Pinterest Marketing Survival Guide
 
Brand Building with Creative Visual Content
Brand Building with Creative Visual ContentBrand Building with Creative Visual Content
Brand Building with Creative Visual Content
 

Dernier

IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Juan Carlos Gonzalez
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementNuwan Dias
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Dernier (20)

IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API Management
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

Pubcon Privacy Legal Presentation by David Mink

  • 1. Privacy Law Developments Handling the sensitive personal information of others. A high stakes venture.
  • 2. Hypothetical Your office is broke into and several company files and company computers are stolen… Sensitive personal information (“SPI”) of your customers is included in these files/computers…
  • 3.
  • 4. Nevada 1. Current law was enacted on October 1, 2008 and requires that “a business in this state” must encrypt personal information of a customer prior to transmission. On January 1, 2010 law will be expanded to also require encryption when data storage devices containing SPI are moved beyond the physical controls of the business. 2. The law does not define “business in this state”, nor does it define “customer” or “personal information”.. . so we do not know whether these definitions are limited to Nevada residents. Therefore, the law appears very broad on its face. 3. Encryption is defined broadly as “the use of any protective or disruptive measure, including, without limitation, cryptography, enciphering, encoding or a computer contaminant, to: A. Prevent, impede, delay or disrupt access to any data, information, image, program, signal or sound; B. Cause or make any data, information, image, program, signal or sound unintelligible or unusable; or C. Prevent, impede, delay or disrupt the normal operation or use of any component, device, equipment, system or network.”
  • 5.
  • 6.
  • 7.
  • 8. Real Risk is the Damage to Brand Image: What is the value of your brand’s image? “ I t takes many good deeds to build a good reputation, and only one bad one to lose it.” -Benjamin Franklin
  • 9. Security Breach = Brand Damage In today’s world, handling people’s sensitive personal information can be a high stakes venture.
  • 10. Best Privacy Practices 1. Review the SPI of individuals which you are collecting information from and the residencies of those individuals. 2. Is it necessary to both collect and store the SPI? Or, to electronically transfer the information? 3. If so, where do you store the SPI? Do you send the SPI to any third parties? 4. Review your Privacy Policy to make sure it is consistent with your business practice of collecting and storing data. 5. Take inventory of how the data is protected. Should it be encrypted? 6. Do you have a “comprehensive information security plan?” How about third parties with access to the SPI?
  • 11. David Mink Dream Systems Media, Owner/Counsel http://www.dreamsystemsmedia.com @dmmink on Twitter