SlideShare a Scribd company logo
1 of 22
Information Protection & Privacy
  – The New High Stakes Game
           Chris Zoladz
Presenter
     • Chris Zoladz, Founder, Navigate LLC
     • Founded Navigate in April 2009 to provide
       strategic and tactical information protection &
       privacy consulting services
     • Former Vice President, Information Protection
       & Privacy at Marriott International, Inc.
     • Founding Board Member and Past President of
       the International Association of Privacy
       Professionals (IAPP)




                                                     1
Agenda

   The Perfect Storm
     Customer Expectations
     Business Demands
     Legal Requirements
   Risk Management Challenges
   Gauging Your Risk
   Recommendations
   The Future

                                 2
Disclaimer


  The information in this presentation is
 provided for informational purposes only,
   and is not intended and should not be
       considered to be legal advice.




                                             3
Events Shaping Consumer
Concerns
! Since 2005 there have been over 341
  million records put at risk in the U.S.
   (Source: Privacy Rights Clearinghouse)


! 91% linked to organized crime
   (Source: Verizon Business Services)


! Some recent headlines:
   -     HeathNet
   -     HSBC
   -     Notre Dame



                                            4
Customer Expectations
Protect their personal information

Do not overuse or misuse their
 information

Inability to meet these expectations
 results in loss of loyalty and business


                                           5
Business Demands
   Maximize revenues and return to shareholders
   Do more with less


                            Increased risk
     Standard processes and controls are bypassed or not
     completely followed
    Movement to outsourcing (e.g., cloud computing) without
     understanding if and how security requirements are met
 Personalized marketing and service delivery

                                                               6
PCI DSS
       PCI DSS = Payment Card Industry Data Security
                        Standard
Comprehensive mandatory information security standard required by credit
                            card companies
                                        Pertains to every
                                        business process,
                                        computer system, website
                                        & service provider that
   12 Security Categories               involves the:
    Approximately 250                   •   Collection
   Specific Requirements                •   Processing
                                        •   Storage
                                        •   Transmission of card
                                            data

                                                                           7
Timeline of Key Privacy Legislation
  1960’s           1970’s            1980’s           1990’s            2000’s
   HISTORICAL INFLUENCE
                                                               EU                9/11                VA
                          Watergate                                                                Laptop
                                                     Advent of eCommerce                            Loss
               Vietnam War
   PRIVATE INDUSTRY IMPACT
                                                                    GLBA                  CA                       Mass
                                                                                                      PCI
FTC Act                                                                                 SB 1386               Privacy Law
1914                                                             COPPA                  47 US States Breach Notification
                         Code of
                     Fair Information                           HIPAA                       CANSPAM
                         Practices                                            US Patriot
                                                                                Act
   US GOV’T IMPACT
                                                                                                    Consolidated
                           Privacy                                              e-Government
                                                                                                   Appropriations
            FOIA             Act                                                     Act
                                                                                                        Act
                                                                                  & FISMA
                                         OECD
                                         Privacy
   INT’L IMPACTS                        Principles                   EU            Canada
                                                               Data Protection    PIPEDA
                                                                 Directive
                                                                          Australian
                                                                          Privacy Act

                                                                                                         8
Timeline of Key Privacy Legislation
  1960’s           1970’s            1980’s           1990’s            2000’s
   HISTORICAL INFLUENCE
                                                               EU                9/11                VA
                          Watergate                                                                Laptop
                                                     Advent of eCommerce                            Loss
               Vietnam War
   PRIVATE INDUSTRY IMPACT
                                                                    GLBA                  CA                       Mass
                                                                                                      PCI
FTC Act                                                                                 SB 1386               Privacy Law
1914                                                             COPPA                  47 US States Breach Notification
                         Code of
                     Fair Information                           HIPAA                       CANSPAM
                         Practices                                            US Patriot
                                                                                Act
   US GOV’T IMPACT
                                                                                                    Consolidated
                           Privacy                                              e-Government
                                                                                                   Appropriations
            FOIA             Act                                                     Act
                                                                                                        Act
                                                                                  & FISMA
                                         OECD
                                         Privacy
   INT’L IMPACTS                        Principles                   EU            Canada
                                                               Data Protection    PIPEDA
                                                                 Directive
                                                                          Australian
                                                                          Privacy Act

                                                                                                         9
FTC’s Position
“Privacy is a central element of the FTC’s consumer
   protection mission.” (Source: www.ftc.gov)


“Internet privacy has been and will remain a foremost area
   of focus. On behavioral marketing, there are obviously
   benefits that targeting can bring to consumers in the
   form of more relevant advertising and the additional
   revenue that targeting can provide. This revenue may be
   vital to the survival of some industries. But we have to
   face the fact that the current model is not working.”
  (Source: Speech by Jon Liebowitz – FTC Chairman in March 2009)



                                                                   10
FTC Act

  Focuses on “unfair” or “deceptive” trade
   practices
  Settlements:
     - range from tens of thousands to
        millions of dollars

     - include agreement by the company to independent oversight
        of their information security program for 20 years.


    Learn More
    http://www.ftc.gov/privacy/privacyinitiates/promises_educ.html



                                                                     11
U.S. State Security Breach Laws
 47 States including the District of
  Columbia have a breach law
 The laws are similar but not the same,
  differences include:
  –   Definition of a breach
  –   Inclusions and exceptions
  –   Definition of PII
  –   Notification Requirements
  Learn More http://www.mofoprivacy.com/disclaimer.aspx

                                                          12
Massachusetts – Are You Ready?
 Standards for The Protection of Personal
  Information of Residents of the
  Commonwealth (effective March 1, 2010)

  Affects all companies that own, license, store or maintain
personal information concerning any Massachusetts resident.

 It is the most recent and most restrictive
  of any State


                                                          13
Massachusetts in Detail
 Written Information       Prevent terminated      Inventory paper
  Security Program             workers from            and electronic
  (“WISP)                      accessing PII           records as well
 Designated Program          Service Provider        as systems and
  Owners                       program                 media
 Employee Training           Limit the collection,  Regularly
                               storage and access to   monitor and
 Policies                                             annually review
  possession of PII           PII
                                                       security
    outside the facility      Risk Assessments        measures
  remote access to           Incident Response      Encrypt PII on
    PII                                                laptops, portable
  disciplinary actions                                devices
    for violations                                    Specific
                                                       computer
                                                       security
                                                       requirements

Learn More http://www.mass.gov/?pageID=ocahomepage&L=1&L0=Home&sid=Eoca
                                                                     14
Risk Management Challenges
   “It won’t happen to us” syndrome
   PII can be in many locations – paper and electronic
      Laptops, Flash drives, CDs
      Blackberrys, iPhones
      Homes’ of Teleworkers
      Third party service providers
      Contractors of third party service providers

   Limited staff and resources to assess and mitigate risk
   Potential resistance to business process and/or
   technology changes
   Focus on revenue generating/cost cutting initiatives -
   period
                                                         15
Gauging Your Risk

  Are there adequate resources dedicated to this
  area?
  Are the necessary activities being focused on?
     Policies and procedures
     Training
     Communications
     Risk Assessment
     Monitoring new threats and legal requirements, etc.
  Is there a current risk assessment?
  Does it include all the places PII is contained?

                                                       16
Gauging Your Risk (cont’d)
  Is senior management aware of the risks?
  Are remediation plans prepared and
  implemented?
  Have insurance options been considered?
  Is the residual risk documented and
  approved by senior management?
  Is there an effective process to manage
  information protection & privacy risks
  and legal requirements on an on-going
  basis?
                                         17
Future of Privacy Legislation
                2000’s                                       2010’s
HISTORICAL INFLUENCE                                         Complications of EU Approach
                          9/11                VA
                                            Laptop               Rise of Identity Theft
                                             Loss                    Complications of State Laws

PRIVATE INDUSTRY IMPACT                                                       Online
                                   CA                       Mass
                                               PCI                          Behavioral
                                 SB 1386               Privacy Law
                                                                          Advertising Regs
                                 47 US States Breach Notification
                                    CANSPAM                                    National
                       US Patriot                                             Privacy or
                         Act                                         Data Protection Law (S.1490)
 US GOV’T IMPACT
                                             Consolidated
                        e-Government
                                            Appropriations
                             Act
                                                 Act
                          & FISMA


INT’L IMPACTS             Canada
                                                                            APEC Privacy Program
                          PIPEDA

                Australian                                                   Rewrite of
                Privacy Act                                             Australian Privacy Act

                                                                                                    18
S.1490 - Personal Data Privacy and
Security Act of 2009
  A bill to:
     Prevent and mitigate identity theft
     Ensure privacy
     Provide notice of security breaches
     Enhance criminal penalties
     Enhance law enforcement assistance
     Enhance other protections against security
     breaches, fraudulent access, and misuse of
     personally identifiable information
  $5,000 per day per violation, up to a maximum of
  $500,000 per violation, double if there is an intentional
  or willful violation

                                                          19
Recommendations
 Data minimization
 Eliminate data duplication
 Secure destruction
 It is not all or nothing - do as much as you
  can as quickly as you can
 Be prepared to defend your company



                                             20
Questions and Contact Details


Chris Zoladz, Founder, Navigate LLC
Chris@navigatellc.net, or 240-475-3640

Learn More http://www.navigatellc.net



                                         21

More Related Content

Viewers also liked

Acd Corporate Presentation (4)
Acd Corporate Presentation (4)Acd Corporate Presentation (4)
Acd Corporate Presentation (4)jim_leaver
 
北京市城市居民购买经济适用住房申请核定表
北京市城市居民购买经济适用住房申请核定表北京市城市居民购买经济适用住房申请核定表
北京市城市居民购买经济适用住房申请核定表thezxm
 
Johdatus Sosiaaliseen Mediaan 08092009
Johdatus Sosiaaliseen Mediaan 08092009Johdatus Sosiaaliseen Mediaan 08092009
Johdatus Sosiaaliseen Mediaan 08092009mmakila
 
HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...
HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...
HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...HospitalityLawyer.com
 

Viewers also liked (9)

Advertiser Funded Programming on MTV- An Analysis
Advertiser Funded Programming on MTV- An AnalysisAdvertiser Funded Programming on MTV- An Analysis
Advertiser Funded Programming on MTV- An Analysis
 
Acd Corporate Presentation (4)
Acd Corporate Presentation (4)Acd Corporate Presentation (4)
Acd Corporate Presentation (4)
 
Trompe Oeil
Trompe OeilTrompe Oeil
Trompe Oeil
 
Participatory content PPT
Participatory content PPTParticipatory content PPT
Participatory content PPT
 
北京市城市居民购买经济适用住房申请核定表
北京市城市居民购买经济适用住房申请核定表北京市城市居民购买经济适用住房申请核定表
北京市城市居民购买经济适用住房申请核定表
 
Johdatus Sosiaaliseen Mediaan 08092009
Johdatus Sosiaaliseen Mediaan 08092009Johdatus Sosiaaliseen Mediaan 08092009
Johdatus Sosiaaliseen Mediaan 08092009
 
Potential Of Food Channels in India
Potential Of Food Channels in IndiaPotential Of Food Channels in India
Potential Of Food Channels in India
 
HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...
HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...
HospitalityLawyer.com | Christopher Elliott Article | What To Do When Your Ho...
 
Law conference brochure
Law conference brochureLaw conference brochure
Law conference brochure
 

Similar to Hospitality Law Conference 2010 - Information Protection & Privacy: The New High Stakes Game - Chris Zoladz

Fsi Consumer Compliance Dbriefs 102808 Show
Fsi Consumer Compliance Dbriefs 102808 ShowFsi Consumer Compliance Dbriefs 102808 Show
Fsi Consumer Compliance Dbriefs 102808 ShowStefan Afendoulis
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
FTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And SummaryFTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And SummaryInternet Law Center
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditBob Rhubart
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Business Development Institute
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...Andris Soroka
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
Technology Trends: Value Office
Technology Trends: Value OfficeTechnology Trends: Value Office
Technology Trends: Value OfficeSSFIndia1
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)Craig Mullins
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010Andris Soroka
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
AnalyzinglegislationDr. TJ Wolfe
 
Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 

Similar to Hospitality Law Conference 2010 - Information Protection & Privacy: The New High Stakes Game - Chris Zoladz (20)

Fsi Consumer Compliance Dbriefs 102808 Show
Fsi Consumer Compliance Dbriefs 102808 ShowFsi Consumer Compliance Dbriefs 102808 Show
Fsi Consumer Compliance Dbriefs 102808 Show
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
FTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And SummaryFTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And Summary
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
Mcafee dyntek
Mcafee dyntekMcafee dyntek
Mcafee dyntek
 
Technology Trends: Value Office
Technology Trends: Value OfficeTechnology Trends: Value Office
Technology Trends: Value Office
 
Hengesbaugh
HengesbaughHengesbaugh
Hengesbaugh
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 
Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 

More from HospitalityLawyer.com

HospitalityLawyer.com | Real Estate + Tourism – Investment Opportunity
HospitalityLawyer.com | Real Estate + Tourism – Investment OpportunityHospitalityLawyer.com | Real Estate + Tourism – Investment Opportunity
HospitalityLawyer.com | Real Estate + Tourism – Investment OpportunityHospitalityLawyer.com
 
HospitalityLawyer.com | Presentacion Gerenciamiento / Management Presentation
HospitalityLawyer.com | Presentacion Gerenciamiento / Management PresentationHospitalityLawyer.com | Presentacion Gerenciamiento / Management Presentation
HospitalityLawyer.com | Presentacion Gerenciamiento / Management PresentationHospitalityLawyer.com
 
HospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate Profile
HospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate ProfileHospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate Profile
HospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate ProfileHospitalityLawyer.com
 
HospitalityLawyer.com | 2013 Global Congress on Travel Risk Management Brochure
HospitalityLawyer.com | 2013 Global Congress on Travel Risk Management BrochureHospitalityLawyer.com | 2013 Global Congress on Travel Risk Management Brochure
HospitalityLawyer.com | 2013 Global Congress on Travel Risk Management BrochureHospitalityLawyer.com
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com
 
HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...
HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...
HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...HospitalityLawyer.com
 
HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...
HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...
HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...HospitalityLawyer.com
 
HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine
HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine
HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine HospitalityLawyer.com
 
HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...
HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...
HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...HospitalityLawyer.com
 
HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...
HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...
HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...HospitalityLawyer.com
 
HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...
HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...
HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...HospitalityLawyer.com
 
Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...
Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...
Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...HospitalityLawyer.com
 
Hospitality Law Conference Preview: Mock Negotiation
Hospitality Law Conference Preview: Mock NegotiationHospitality Law Conference Preview: Mock Negotiation
Hospitality Law Conference Preview: Mock NegotiationHospitalityLawyer.com
 
Hospitality Law Conference Preview: FLSA
Hospitality Law Conference Preview: FLSAHospitality Law Conference Preview: FLSA
Hospitality Law Conference Preview: FLSAHospitalityLawyer.com
 
Hospitality Law Conference: Data Security Preview
Hospitality Law Conference: Data Security PreviewHospitality Law Conference: Data Security Preview
Hospitality Law Conference: Data Security PreviewHospitalityLawyer.com
 
Conducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace InvestigationsConducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace InvestigationsHospitalityLawyer.com
 
Understanding and Negotiating Leisure Sales Agreements
Understanding and Negotiating Leisure Sales AgreementsUnderstanding and Negotiating Leisure Sales Agreements
Understanding and Negotiating Leisure Sales AgreementsHospitalityLawyer.com
 
Trademark, Copyright, and Sweepstakes Basics
Trademark, Copyright, and Sweepstakes BasicsTrademark, Copyright, and Sweepstakes Basics
Trademark, Copyright, and Sweepstakes BasicsHospitalityLawyer.com
 
Managing Risk in Pools, Spas, and Workout Facilities
Managing Risk in Pools, Spas, and Workout FacilitiesManaging Risk in Pools, Spas, and Workout Facilities
Managing Risk in Pools, Spas, and Workout FacilitiesHospitalityLawyer.com
 

More from HospitalityLawyer.com (20)

HospitalityLawyer.com | Real Estate + Tourism – Investment Opportunity
HospitalityLawyer.com | Real Estate + Tourism – Investment OpportunityHospitalityLawyer.com | Real Estate + Tourism – Investment Opportunity
HospitalityLawyer.com | Real Estate + Tourism – Investment Opportunity
 
HospitalityLawyer.com | Presentacion Gerenciamiento / Management Presentation
HospitalityLawyer.com | Presentacion Gerenciamiento / Management PresentationHospitalityLawyer.com | Presentacion Gerenciamiento / Management Presentation
HospitalityLawyer.com | Presentacion Gerenciamiento / Management Presentation
 
HospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate Profile
HospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate ProfileHospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate Profile
HospitalityLawyer.com | Perfil Corporativo Aspen - Aspen Corporate Profile
 
HospitalityLawyer.com | 2013 Global Congress on Travel Risk Management Brochure
HospitalityLawyer.com | 2013 Global Congress on Travel Risk Management BrochureHospitalityLawyer.com | 2013 Global Congress on Travel Risk Management Brochure
HospitalityLawyer.com | 2013 Global Congress on Travel Risk Management Brochure
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
 
HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...
HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...
HospitalityLawyer.com | Melissa Dallas Case Study | Assessing Corporate Socia...
 
HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...
HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...
HospitalityLawyer.com | Linda K. Enghagen Lawsuit Study | Compliance With Sam...
 
HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine
HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine
HospitalityLawyer.com | December 2012 Issue Hospitality Lawyer Magazine
 
HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...
HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...
HospitalityLawyer.com | 2013 Hospitality Law Conference Brochure | Hospitalit...
 
HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...
HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...
HospitalityLawyer.com | Stephen Barth in Lodging Hospitality Magazine Article...
 
HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...
HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...
HospitalityLawyer.com | Chicago Tribune Article | What To Do When Your Hotel ...
 
Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...
Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...
Corporate Responsibility in the Travel Equation - Stephen Barth - Global Cong...
 
Hospitality Law Conference Preview: Mock Negotiation
Hospitality Law Conference Preview: Mock NegotiationHospitality Law Conference Preview: Mock Negotiation
Hospitality Law Conference Preview: Mock Negotiation
 
Hospitality Law Conference Preview: FLSA
Hospitality Law Conference Preview: FLSAHospitality Law Conference Preview: FLSA
Hospitality Law Conference Preview: FLSA
 
Hospitality Law Conference: Data Security Preview
Hospitality Law Conference: Data Security PreviewHospitality Law Conference: Data Security Preview
Hospitality Law Conference: Data Security Preview
 
Conducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace InvestigationsConducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace Investigations
 
The Stressful Side of Spas
The Stressful Side of SpasThe Stressful Side of Spas
The Stressful Side of Spas
 
Understanding and Negotiating Leisure Sales Agreements
Understanding and Negotiating Leisure Sales AgreementsUnderstanding and Negotiating Leisure Sales Agreements
Understanding and Negotiating Leisure Sales Agreements
 
Trademark, Copyright, and Sweepstakes Basics
Trademark, Copyright, and Sweepstakes BasicsTrademark, Copyright, and Sweepstakes Basics
Trademark, Copyright, and Sweepstakes Basics
 
Managing Risk in Pools, Spas, and Workout Facilities
Managing Risk in Pools, Spas, and Workout FacilitiesManaging Risk in Pools, Spas, and Workout Facilities
Managing Risk in Pools, Spas, and Workout Facilities
 

Recently uploaded

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 

Recently uploaded (20)

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 

Hospitality Law Conference 2010 - Information Protection & Privacy: The New High Stakes Game - Chris Zoladz

  • 1. Information Protection & Privacy – The New High Stakes Game Chris Zoladz
  • 2. Presenter • Chris Zoladz, Founder, Navigate LLC • Founded Navigate in April 2009 to provide strategic and tactical information protection & privacy consulting services • Former Vice President, Information Protection & Privacy at Marriott International, Inc. • Founding Board Member and Past President of the International Association of Privacy Professionals (IAPP) 1
  • 3. Agenda  The Perfect Storm  Customer Expectations  Business Demands  Legal Requirements  Risk Management Challenges  Gauging Your Risk  Recommendations  The Future 2
  • 4. Disclaimer The information in this presentation is provided for informational purposes only, and is not intended and should not be considered to be legal advice. 3
  • 5. Events Shaping Consumer Concerns ! Since 2005 there have been over 341 million records put at risk in the U.S. (Source: Privacy Rights Clearinghouse) ! 91% linked to organized crime (Source: Verizon Business Services) ! Some recent headlines: - HeathNet - HSBC - Notre Dame 4
  • 6. Customer Expectations Protect their personal information Do not overuse or misuse their information Inability to meet these expectations results in loss of loyalty and business 5
  • 7. Business Demands  Maximize revenues and return to shareholders  Do more with less Increased risk  Standard processes and controls are bypassed or not completely followed Movement to outsourcing (e.g., cloud computing) without understanding if and how security requirements are met  Personalized marketing and service delivery 6
  • 8. PCI DSS PCI DSS = Payment Card Industry Data Security Standard Comprehensive mandatory information security standard required by credit card companies Pertains to every business process, computer system, website & service provider that 12 Security Categories involves the: Approximately 250 • Collection Specific Requirements • Processing • Storage • Transmission of card data 7
  • 9. Timeline of Key Privacy Legislation 1960’s 1970’s 1980’s 1990’s 2000’s HISTORICAL INFLUENCE EU 9/11 VA Watergate Laptop Advent of eCommerce Loss Vietnam War PRIVATE INDUSTRY IMPACT GLBA CA Mass PCI FTC Act SB 1386 Privacy Law 1914 COPPA 47 US States Breach Notification Code of Fair Information HIPAA CANSPAM Practices US Patriot Act US GOV’T IMPACT Consolidated Privacy e-Government Appropriations FOIA Act Act Act & FISMA OECD Privacy INT’L IMPACTS Principles EU Canada Data Protection PIPEDA Directive Australian Privacy Act 8
  • 10. Timeline of Key Privacy Legislation 1960’s 1970’s 1980’s 1990’s 2000’s HISTORICAL INFLUENCE EU 9/11 VA Watergate Laptop Advent of eCommerce Loss Vietnam War PRIVATE INDUSTRY IMPACT GLBA CA Mass PCI FTC Act SB 1386 Privacy Law 1914 COPPA 47 US States Breach Notification Code of Fair Information HIPAA CANSPAM Practices US Patriot Act US GOV’T IMPACT Consolidated Privacy e-Government Appropriations FOIA Act Act Act & FISMA OECD Privacy INT’L IMPACTS Principles EU Canada Data Protection PIPEDA Directive Australian Privacy Act 9
  • 11. FTC’s Position “Privacy is a central element of the FTC’s consumer protection mission.” (Source: www.ftc.gov) “Internet privacy has been and will remain a foremost area of focus. On behavioral marketing, there are obviously benefits that targeting can bring to consumers in the form of more relevant advertising and the additional revenue that targeting can provide. This revenue may be vital to the survival of some industries. But we have to face the fact that the current model is not working.” (Source: Speech by Jon Liebowitz – FTC Chairman in March 2009) 10
  • 12. FTC Act  Focuses on “unfair” or “deceptive” trade practices  Settlements: - range from tens of thousands to millions of dollars - include agreement by the company to independent oversight of their information security program for 20 years. Learn More http://www.ftc.gov/privacy/privacyinitiates/promises_educ.html 11
  • 13. U.S. State Security Breach Laws  47 States including the District of Columbia have a breach law  The laws are similar but not the same, differences include: – Definition of a breach – Inclusions and exceptions – Definition of PII – Notification Requirements Learn More http://www.mofoprivacy.com/disclaimer.aspx 12
  • 14. Massachusetts – Are You Ready?  Standards for The Protection of Personal Information of Residents of the Commonwealth (effective March 1, 2010) Affects all companies that own, license, store or maintain personal information concerning any Massachusetts resident.  It is the most recent and most restrictive of any State 13
  • 15. Massachusetts in Detail  Written Information  Prevent terminated  Inventory paper Security Program workers from and electronic (“WISP) accessing PII records as well  Designated Program  Service Provider as systems and Owners program media  Employee Training  Limit the collection,  Regularly storage and access to monitor and  Policies annually review possession of PII PII security outside the facility  Risk Assessments measures remote access to  Incident Response  Encrypt PII on PII laptops, portable disciplinary actions devices for violations  Specific computer security requirements Learn More http://www.mass.gov/?pageID=ocahomepage&L=1&L0=Home&sid=Eoca 14
  • 16. Risk Management Challenges “It won’t happen to us” syndrome PII can be in many locations – paper and electronic Laptops, Flash drives, CDs Blackberrys, iPhones Homes’ of Teleworkers Third party service providers Contractors of third party service providers Limited staff and resources to assess and mitigate risk Potential resistance to business process and/or technology changes Focus on revenue generating/cost cutting initiatives - period 15
  • 17. Gauging Your Risk Are there adequate resources dedicated to this area? Are the necessary activities being focused on? Policies and procedures Training Communications Risk Assessment Monitoring new threats and legal requirements, etc. Is there a current risk assessment? Does it include all the places PII is contained? 16
  • 18. Gauging Your Risk (cont’d) Is senior management aware of the risks? Are remediation plans prepared and implemented? Have insurance options been considered? Is the residual risk documented and approved by senior management? Is there an effective process to manage information protection & privacy risks and legal requirements on an on-going basis? 17
  • 19. Future of Privacy Legislation 2000’s 2010’s HISTORICAL INFLUENCE Complications of EU Approach 9/11 VA Laptop Rise of Identity Theft Loss Complications of State Laws PRIVATE INDUSTRY IMPACT Online CA Mass PCI Behavioral SB 1386 Privacy Law Advertising Regs 47 US States Breach Notification CANSPAM National US Patriot Privacy or Act Data Protection Law (S.1490) US GOV’T IMPACT Consolidated e-Government Appropriations Act Act & FISMA INT’L IMPACTS Canada APEC Privacy Program PIPEDA Australian Rewrite of Privacy Act Australian Privacy Act 18
  • 20. S.1490 - Personal Data Privacy and Security Act of 2009 A bill to: Prevent and mitigate identity theft Ensure privacy Provide notice of security breaches Enhance criminal penalties Enhance law enforcement assistance Enhance other protections against security breaches, fraudulent access, and misuse of personally identifiable information $5,000 per day per violation, up to a maximum of $500,000 per violation, double if there is an intentional or willful violation 19
  • 21. Recommendations  Data minimization  Eliminate data duplication  Secure destruction  It is not all or nothing - do as much as you can as quickly as you can  Be prepared to defend your company 20
  • 22. Questions and Contact Details Chris Zoladz, Founder, Navigate LLC Chris@navigatellc.net, or 240-475-3640 Learn More http://www.navigatellc.net 21