This course is no longer available for credit on our site. Explore our online catalog to view more courses
On Demand
Unlimited

Protecting Your Connected World: Where IT and the Law Intersect

1h 36m

Created on August 16, 2016

Intermediate

Overview

We live in a connected world. The technology we utilize on a daily basis exposes us all to potentially catastrophic cyber breaches. Every day, criminals, cyber-terrorists, and hacktivists target domestic and international business networks to obtain health records, social security numbers, and valuable trade secrets. The cyber-breach also threatens the integrity of business networks, with the risk of network degradation and/ or lockouts. In short, a cyber-breach can have devastating financial consequences and business operation.   

All companies should take meaningful steps toward securing their data, preventing data breaches, and minimizing potential liability. But if the unthinkable suddenly becomes reality, there are myriad legal and regulatory challenges that erupt the moment a breach is discovered. Cyber threats do not end with the initial response to a data breach. It continues to data security-related counseling and crisis management. Understanding that every decision made before and during a cyber breach can dramatically impact potential liability and the course of future litigation. Knowing the potential source of liability and the proper response can assist in minimizing the risks that loom after a breach.

David Schwed and James Paulino assist viewers in understanding the current nature and scope of cyber threats, and the duties imposed on businesses and business leaders in the current legal and regulatory environment.  This program also provides a practical guide on how to minimize corporate and personal exposure following a cyber breach through an examination of the legal and regulatory schemes governing cyber-breach response.


Learning Objectives:

  1. Discuss differences between traditional Information Technology objectives vs. information security
  2. Provide overview of cyber security landscape and why it’s important for all businesses to have a mature information security program
  3. Identify different regulatory requirements surrounding the protection of information (e.g. GLBA, HIPAA, HITECH, FERPA, COPA, etc.)
  4. Understand the importance of involving counsel before, during, including suspected, and after a breach has occurred
  5. Grasp how a business should engage and communicate with counsel (privilege/work product)
  6. Recognize the importance of a mature security incident response plan
  7. Appreciate the strategies surrounding breach related litigation and defense

Gain access to this course, plus unlimited access to 2000+ courses, with an Unlimited Subscription.

Explore Lawline Subscriptions