Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Protecting Your Company's Data from Security Breaches

By Jeffrey Kosc
December 31, 2015

The last several years have seen a series of high-profile data security breaches resulting in adverse publicity and significant costs for the targets of these breaches. Whether a targeted attack or a hacker seeking a weak network, even the best security systems may ultimately be compromised by sophisticated attackers. This article explores some steps counsel can take to protect their organizations from a data breach, and how counsel can proactively help to mitigate any adverse impact in the unfortunate event a data breach occurs.

Know What Data Your Organization Has, Where That Data Goes and Where It Originated

It is important for counsel to understand the nature and scope of sensitive data that its organization uses in the course of its business, and how this data flows through the business. Significant obligations may be imposed on your entity based on the type and nature of data, and how that data is used in the business. Counsel's inquiry should cover not only the company's own data, but also data that the company handles on behalf of third parties (customers and vendors). Certain information can give rise to statutory or regulatory obligations that may require heightened security procedures, such as healthcare or financial information. Other information may trigger audit concerns for the entity or its clients: Just as important as understanding the scope and nature of the data is understanding how your entity came to possess the data and what happens to that data while in your entity's control. Counsel needs to evaluate how the data was collected as certain disclosures may need to be made at the point of collection, or certain contractual obligations may need to be imposed on agents that interact with the data. Next, it is important to understand the lifecycle of the data within your organization. Where is it stored and how is it secured? Is it ever processed or transmitted and, if so, what protections are taken during those steps? Is it ever transmitted across international borders? If the data is subject to regulation, are those requirements being met? Finally, counsel must understand how data is disposed of once it is no longer useful. Are contractual and regulatory obligations being met? Does the handling of the data comply with the organization's retention policy? With a full understanding of the data's path through your entity, you will be better able to protect the data on a day-to-day basis.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Removing Restrictive Covenants In New York Image

In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?

Legal Possession: What Does It Mean? Image

Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.