Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

In-House Counsel's Growing Role in Data Protection and Security Risk Management

By Deana Uhl
July 01, 2018
as reported by IDG 2017 Cost of Cyber Crime Study ALM/Morrison Forrester Crisis Management In-Depth Report

Mapping the Risk

General Data Protection Regulation (GDPR)
  • Policies and standards: A strong framework of policies must be the foundation. Often there are a number of standards in different parts of a company, but they are not coordinated. It is important to take a top down approach, so a common security, privacy and data protection taxonomy and standards are in place holistically across the organization.
  • Identification and classification: Not all data is equal across a company, and a map of the data landscape is critical. Critical assets should be identified and grouped together, separate from the less sensitive information stored within the organization.
  • Governance: The policies established must include built-in enforcement measures. Processes and technologies can be leveraged to track internal compliance with policies and ensure they are sustained across the organization and with third parties.
  • Regulatory considerations: Most multi-national organizations are dealing with a patchwork of regulations, and data protection programs must address compliance with any industry and cross-border requirements that apply.
  • Change management: The entire workforce must be on board for programs to be effective. Change management and training are critical elements to any such program and will drive awareness so that everyone from the board members to the interns understand what must be done.

Developing Incident Response

  • Assessment: The plan should outline the organizational environment, including identified roles and responsibilities for who will be involved in certain incidents based on the risk model. This also includes defining a broader governance committee of stakeholders across legal, IT, executive leadership, information security, etc.
  • Defense: The plan implements and manages defensive best practices, including access control, network maintenance and deployment of proactive technology. Continuous monitoring to identify threats rapidly and proactively (a result of knowing in advance the main areas of risk) helps keep the organization one step ahead of threats.
  • Response: Even a huge investment of time, budget and energy into cybersecurity will not make an organization immune. Response must be viewed not as an IT problem, but as a business operations activity. It should ensure proper notification of authorities and impacted parties, as required by the various laws to which the organization is subject.
  • Recovery: This is where practice drills and lessons learned come into play. Teams must holistically look at the nuances of the breach to learn from it and strengthen the position so it does not happen again.

Conclusion

***** Deana Uhl

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

Removing Restrictive Covenants In New York Image

In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

The Cost of Making Partner Image

Making partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.