Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

In-House Counsel's Growing Role in Data Protection and Security Risk Management

By Deana Uhl
July 01, 2018
as reported by IDG 2017 Cost of Cyber Crime Study ALM/Morrison Forrester Crisis Management In-Depth Report

Mapping the Risk

General Data Protection Regulation (GDPR)
  • Policies and standards: A strong framework of policies must be the foundation. Often there are a number of standards in different parts of a company, but they are not coordinated. It is important to take a top down approach, so a common security, privacy and data protection taxonomy and standards are in place holistically across the organization.
  • Identification and classification: Not all data is equal across a company, and a map of the data landscape is critical. Critical assets should be identified and grouped together, separate from the less sensitive information stored within the organization.
  • Governance: The policies established must include built-in enforcement measures. Processes and technologies can be leveraged to track internal compliance with policies and ensure they are sustained across the organization and with third parties.
  • Regulatory considerations: Most multi-national organizations are dealing with a patchwork of regulations, and data protection programs must address compliance with any industry and cross-border requirements that apply.
  • Change management: The entire workforce must be on board for programs to be effective. Change management and training are critical elements to any such program and will drive awareness so that everyone from the board members to the interns understand what must be done.

Developing Incident Response

  • Assessment: The plan should outline the organizational environment, including identified roles and responsibilities for who will be involved in certain incidents based on the risk model. This also includes defining a broader governance committee of stakeholders across legal, IT, executive leadership, information security, etc.
  • Defense: The plan implements and manages defensive best practices, including access control, network maintenance and deployment of proactive technology. Continuous monitoring to identify threats rapidly and proactively (a result of knowing in advance the main areas of risk) helps keep the organization one step ahead of threats.
  • Response: Even a huge investment of time, budget and energy into cybersecurity will not make an organization immune. Response must be viewed not as an IT problem, but as a business operations activity. It should ensure proper notification of authorities and impacted parties, as required by the various laws to which the organization is subject.
  • Recovery: This is where practice drills and lessons learned come into play. Teams must holistically look at the nuances of the breach to learn from it and strengthen the position so it does not happen again.

Conclusion

***** Deana Uhl

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Overview of Regulatory Guidance Governing the Use of AI Systems In the Workplace Image

Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.

Is Google Search Dead? How AI Is Reshaping Search and SEO Image

This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.

While Federal Legislation Flounders, State Privacy Laws for Children and Teens Gain Momentum Image

For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.

Revolutionizing Workplace Design: A Perspective from Gray Reed Image

In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.

From DeepSeek to Distillation: Protecting IP In An AI World Image

Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.