Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

In-House Counsel's Growing Role in Data Protection and Security Risk Management

By Deana Uhl
July 01, 2018

as reported by IDG 2017 Cost of Cyber Crime Study ALM/Morrison Forrester Crisis Management In-Depth Report |

Mapping the Risk

General Data Protection Regulation (GDPR)

  • Policies and standards: A strong framework of policies must be the foundation. Often there are a number of standards in different parts of a company, but they are not coordinated. It is important to take a top down approach, so a common security, privacy and data protection taxonomy and standards are in place holistically across the organization.
  • Identification and classification: Not all data is equal across a company, and a map of the data landscape is critical. Critical assets should be identified and grouped together, separate from the less sensitive information stored within the organization.
  • Governance: The policies established must include built-in enforcement measures. Processes and technologies can be leveraged to track internal compliance with policies and ensure they are sustained across the organization and with third parties.
  • Regulatory considerations: Most multi-national organizations are dealing with a patchwork of regulations, and data protection programs must address compliance with any industry and cross-border requirements that apply.
  • Change management: The entire workforce must be on board for programs to be effective. Change management and training are critical elements to any such program and will drive awareness so that everyone from the board members to the interns understand what must be done.
|

Developing Incident Response

  • Assessment: The plan should outline the organizational environment, including identified roles and responsibilities for who will be involved in certain incidents based on the risk model. This also includes defining a broader governance committee of stakeholders across legal, IT, executive leadership, information security, etc.
  • Defense: The plan implements and manages defensive best practices, including access control, network maintenance and deployment of proactive technology. Continuous monitoring to identify threats rapidly and proactively (a result of knowing in advance the main areas of risk) helps keep the organization one step ahead of threats.
  • Response: Even a huge investment of time, budget and energy into cybersecurity will not make an organization immune. Response must be viewed not as an IT problem, but as a business operations activity. It should ensure proper notification of authorities and impacted parties, as required by the various laws to which the organization is subject.
  • Recovery: This is where practice drills and lessons learned come into play. Teams must holistically look at the nuances of the breach to learn from it and strengthen the position so it does not happen again.
|

Conclusion

***** Deana Uhl

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

CoStar Wins Injunction for Breach-of-Contract Damages In CRE Database Access Lawsuit Image

Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.

Fresh Filings Image

Notable recent court filings in entertainment law.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.