Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Developing Effective Information Security Programs

By Kirk J. Nahra
September 20, 2005

For many years, financial institutions and other entities that collect personal information focused on privacy as an emerging legal doctrine presenting compliance challenges and an array of business implications. These issues, while still important and subject to ongoing debate and tinkering, have become, for many financial institutions, an automatic component of ongoing business activities. Now, with all of the attention focused on security of customer information driven by the recent flood of news stories concerning security breaches in numerous industries, privacy's ugly stepchild ' the security of consumer information ' has moved to the forefront of concern, both for financial institutions and the various entities that regulate and oversee them. News stories reporting security breaches are an almost daily occurrence. New legislation is being introduced almost constantly, at both the state and national level. While financial institutions already face a raft of security-related compliance obligations, including the Gramm-Leach-Bliley Act and others, financial institutions and their important business partners have been a focus of many of the most highly publicized breaches.

With this background, financial institutions (and other companies across America and globally) should be re-evaluating their information security programs. In reviewing the various legal requirements, what are the primary components of an effective security program? And what are the most difficult challenges facing companies in trying to move from a security “best practices” environment to one requiring compliance with specific legal obligations?

Read These Next
Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About It Image

Why is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?

Bankruptcy Sales: Finding a Diamond In the Rough Image

There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.

The DOJ's Corporate Enforcement Policy: One Year Later Image

The DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.

A Lawyer's System for Active Reading Image

Active reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.

Protecting Innovation in the Cyber World from Patent Trolls Image

With trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.