The Legal Perspective
November 20-24, 2006
Guest Speaker – Glenn Manishin
Kelley Drye Collier Shannon - www.kelleydrye.com
Monday, November 20, 2006
Information security breaches in the United States are reported at an astonishing rate of one every three days. Would you know if an employee had access to customer and corporate files or databases that he or she shouldn’t have? Or if your employees used weak passwords that a hacker could easily bypass? Are all of your company’s mobile devices secure from unauthorized access to personal information? If you are unsure about any of these answers, consider conducting a risk assessment of your data. Certain federal and state laws require this level of data protection to help avoid breaches. Ensuring your practices are up to date now will help you set policies and procedures to lessen the chance that your company has a risk of a data security breach that could cost you millions of dollars.
Wednesday, November 22, 2006
With today’s evolving technology, a wide variety of communication channels are available to your employees—from unrestricted company databases, to email, instant messaging, file sharing, and blogging. Insider threats to networks are increasing, and deliberate and inadvertent leaks of personal information are occurring more frequently, triggering notice obligations and regulator enforcement. On average, a data security breach will cost your company $140 per comprised record, equating to about $14 million per data loss incident. Today you need processes to monitor activity, and enforce policies that govern how data is created, stored, shared, used, and disposed.
Friday, November 24, 2006
In the past several years, many companies and their customers have fallen victim to data security breaches. As many as 88 million Americans -- more than one in four – have had digital data exposed in the past year and a half. Make sure your customers’ information is reasonably protected so that your business does not become part of this devastating statistic. Look for information technology firms and legal counsel to advise you on security planning and compliance, audit your existing policies and procedures, draft new policies if needed, and train your staff on how to protect information. These practices are required of most businesses by federal and state law.
Choose a link below to find out more: