Home » Privacy

TAG: Privacy: Lopsider content relating to Privacy. Subscribe

Building a General Data Protection … (GDPR) Compliance Program

Source | 2017-06-26T18:55:41+00:00 Nov 30th, 2016|Categories: Resource|Tags: , |

This ACC webcast gives a brief overview of GDPR but then goes into detail about how to build a GDPR compliance program, the pitfalls to avoid as well as key messages in house counsel need to give to executives to ensure this work happens. It also discussed the types of work that will be required and the budgets associated with that.

What’s the Real Impact of the GDPR?

Source | 2017-06-26T18:55:43+00:00 Nov 28th, 2016|Categories: Resource|Tags: , , |

Don't let Brexit fool you, we all need to worry about the General Data Protection Regulation (GDPR). An ILTA panel of experts explored the myths and realities of the GDPR and enable you to become compliant by the May 2018 deadline. Are there advantages for early adopters? What trigger points, responsibilities and liabilities apply to DPOs under the GDPR? What can the EU learn about breach notifications from the US experience? Will data mapping be an enhancement to privacy or a compliance burden? Join us to learn the answers to these questions.

Third-Party Risk: Creating an Effective Information Security and Data Privacy Assessment Program for Third-party Vendors

Source | 2017-06-26T23:59:44+00:00 Oct 17th, 2016|Categories: Resource|Tags: , , , |

This ACC program focused on effective information security and data privacy assessment programs for third-party vendors—including practical tips for effectively assessing information security practices and procedures of third-party vendors, such as law firms and other professional consultants — from the pros and cons of using industry-standard questionnaires to determining when onsite reviews are appropriate and how to handle subcontractors.

Carrier IQ and security of certain mobile devices

Source | 2017-07-07T16:41:36+00:00 Nov 30th, 2011|Categories: LegalEthics, Post|Tags: , , , , , , |

An interesting, perhaps troubling, issue raised with respect to security of certain mobile devices. Read more about Carrier IQ  (http://www.geek.com/articles/mobile/how-much-of-your-phone-is-yours-20111115/, http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/carrieriq-part2/, http://www.wired.com/threatlevel/2011/11/secret-software-logging-video  A somewhat long video of how this works is [...]

Comments Off on Carrier IQ and security of certain mobile devices

California Issues Ethics Opinion on Confidentiality and the Use of E-mail and Technology To Transmit Client Information

Source | 2017-06-26T18:36:58+00:00 Dec 26th, 2010|Categories: LegalEthics, Post|Tags: , , , , , , , , |

California Formal Opinion 2010-179 outlines the lawyer's duties when transmitting or storing confidential client information when the underlying technology may be susceptible to unauthorized access by third parties. An attorney’s [...]

Comments Off on California Issues Ethics Opinion on Confidentiality and the Use of E-mail and Technology To Transmit Client Information
View More