SlideShare a Scribd company logo
  Simplifying Law Firm Information Security Compliance  - An Executive Briefing  Prepared by: David Cunningham, Managing Director Meg Block, Managing Director March 2010 Excerpt with a Focus on Encryption
Table of Contents Summary of Relevant Regulatory Information Key Regulatory Issues Focus on Encryption Expectations
Relevant Information Security Regulations HI-TECH makes Health Information Portability and Accountability Act (HIPAA) relevant to law firms as “business associates” of covered health care entities International Traffic in Arms Regulations (ITAR) 2009 Massachusetts Standard for the Protection of Personal Information of Residents of the Commonwealth  201 CMR 17.00  implements the   provisions of  Massachusetts General Law 93H aka  Massachusetts Data Privacy Law US EU Safe Harbor Framework Red Flags Rule International Standards Organization (ISO) 27001-2005
Regulatory Summary March 1, 2010 $5,000 per incident plus costs of investigation, litigation and legal fees, plus potential civil penalties “ Personal information about a resident of the Commonwealth” of Massachusetts State of Massachusetts Massachusetts Data Privacy Law February 17, 2010 $100 - $50,000 per incident; $1.5M max per year. “ Protected Health Information” aka PHI Health and Human Services HIPAA /  HI-TECH Voluntary  (replaces Data Transfer Agreements) Up to $12,000 per day for violations Personal information transferred to or from 27 Members States of the European Union US Dept of Commerce / Federal Trade Commission Safe Harbor 60 days in advance of any intended sale or transfer to a foreign person of ownership or control Per violation, civil fines up to $500K; criminal penalties up to $1M and 10 years imprisonment “ Export of technical data and classified defense articles”, as defined by the US Munitions List US Department of State ITAR None at this time Currently not applicable to law firms due to ABA objections, but the FTC is appealing Personal identifying information (PII is PHI plus credit card, tax ID, insurance claim, background checks, etc.) Federal Trade Commission Red Flags Rule Regulation Governing Body Information Addressed Penalties Law Firm Compliance Date ISO 27001 International Standards Organization (ISO) Determined by company and its auditor via Statements of Applicability None Voluntary
Regulatory Compliance Actions None Designation of people to maintain Disciplinary actions for violations Third party adherence Maintain security system/program Response actions Written Information Security Plan; security policies Identify MA personal info; identify and assess internal and external threats Massachusetts Data Privacy Law None Administrative, Physical and Technical safeguards Business Associate Agreements Breach notification procedures Information Security Policy; DR plan Identify PHI; review information system activity HIPAA /  HI-TECH Self-Registration with the US Department of Commerce, plus annual reaffirmations User awareness, notice, and choice (opt-in or opt-out) Third party adherence Compliance verification mechanisms, including annual reaffirmations Dispute resolution service Privacy Policy and Privacy Statement Identify PI  Safe Harbor Registration with the Directorate of Defense Trade Controls  Registration application None Indentify data and systems relevant to US Munitions List ITAR Regulation Assessment Plans and Policies Procedures Needed Registration or Audit ISO 27001 Review policies, objectives, and procedures relevant to info security Information Security Management System Plan (Establish ISMS) Do (Implement and operate the ISMS) Check (Monitor and review the ISMS) Act (Maintain and improve the ISMS) Audit by ISO auditor every two years
Massachusetts Data Privacy Law Indicative of an emerging legislative trend Similar law in Nevada (but applicable only when doing business in Nevada) New Jersey, Washington, and Michigan are working on privacy legislation Assumed to be eventually trumped by a federal regulation
Massachusetts Data Privacy Law Excerpt on access control and encryption “… establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, shall have the following elements: (2) Secure access control measures that: (a) restrict access to records and files containing personal information to those who need such information to perform their job duties; and (3) Encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data containing personal information to be transmitted wirelessly. (5) Encryption of all personal information stored on laptops or other portable devices;”
Massachusetts Data Privacy Law Clarifications “ All of the computer security provisions apply to a business if they are technically feasible.” “Technically feasible” means that if there is a reasonable means through technology to accomplish a required result, then that reasonable means must be used. Risk-based approach A risk-based approach is one that directs a business to establish a written security program that takes into account the particular business' size, scope of business, amount of resources, nature and quantity of data collected or stored, and the need for security. Both the statute and the regulations specify that security programs should take into account the size and scope of your business, the resources that you have available to you, the amount of data you store, and the need for confidentiality. This will be judged on a case by case basis.
Massachusetts Data Privacy Law * Answers are excerpts from the Commonwealth of Massachusetts’  FAQ Regarding 201 CMR 17.00   “ You must encrypt backup tapes on a prospective basis. However, if you are going to transport a backup tape from current storage, and it is technically feasible to encrypt (i.e. the tape allows it) then you must do so prior to the transfer. If it is not technically feasible, then you should consider the sensitivity of the information, the amount of personal information and the distance to be traveled and take appropriate steps to secure and safeguard the personal information.” Backup Tapes Yes, “but only those portable devices that contain personal information of customers or employees and only where technically feasible. The "technical feasibility" language of the regulation is intended to recognize that at this period in the development of encryption technology, there is little, if any, generally accepted encryption technology for most portable devices, such as cell phones, blackberries, net books, iPhones and similar devices. While it may not be possible to encrypt such portable devices, personal information should not be placed at risk in the use of such devices. There is, however, technology available to encrypt laptops.” Portable Devices “ You are responsible for the selection and retention of a third-party service provider who is capable of properly safeguarding personal information.” Third Parties “ If it is not technically feasible to do so, then no. However, you should implement best practices by not sending unencrypted personal information in an email. There are alternative methods to communicate personal information other through email, such as establishing a secure website that requires safeguards such as a username and password to conduct transactions involving personal information.” E-Mail with Personal Information Asset Encryption Expectations*
Massachusetts Data Privacy Law Further clarifications Do communications with clients already covered by the attorney-client privilege immunize me from complying with 201 CMR 17.00?  No.  If you own or license personal information, you must comply with 201 CMR 17.00 regardless of privileged or confidential communications. Do I have to do an inventory of all my paper and electronic records?  No, you do not have to inventory your records. However, you should perform a risk assessment and identify which of your records contain personal information so that you can handle and protect that information. Does 201 CMR 17.00 set a maximum period of time in which I can hold onto/retain documents containing personal information?  No. That is a business decision you must make. However, as a good business practice, you should limit the amount of personal information collected to that reasonably necessary to accomplish the legitimate purpose for which it is collected and limit the time such information is retained to that reasonably necessary to accomplish such purpose. You should also limit access to those persons who are reasonably required to know such information.
ITAR Process Register with the Directorate of Defense Trade Controls  The USPTO’s patent web portal now requires certification of compliance before users may log into the system. Easy to have violations “… disclosure or transfer to a foreign national,  even if within U.S. borders .” “… proprietary company information is not considered to be in the public domain.”
Safe Harbor “ The FTC and DoT have both stated in letters to the European Commission that they can take enforcement action against organizations that state they are in compliance with the Safe Harbor, but then fail to live up to their statements.” Of large firms, only Shearman & Sterling is current registered
ISO 27001 Family of Standards ISO certification is most relevant for government clients, but is a helpful overlay for all regulatory requirements Published standards ISO/IEC 27000 — Information security management systems — Overview and vocabulary ISO/IEC 27001 — Information security management systems — Requirements  ISO/IEC 27002 — Code of practice for information security management (previously ISO/IEC 17799:2005) ISO/IEC 27003 — Information security management system implementation guidance  ISO/IEC 27004 — Information security management — Measurement  ISO/IEC 27005 — Information security risk management  ISO/IEC 27006 — Requirements for bodies providing audit and certification of IS management systems  ISO/IEC 27007 — Guidelines for information security management systems auditing  ISO/IEC 27011 — Info security management guidelines for telecom organizations based on ISO/IEC 27002  In draft ISO/IEC 27008 - a guideline for Information Security Management auditing (focus on security controls)  ISO/IEC 27013 - a guideline on the integrated implementation of ISO/IEC 20000-1 and ISO/IEC 27001  ISO/IEC 27014 - an information security governance framework  ISO/IEC 27015 - information security management guidelines for the finance and insurance sectors  ISO/IEC 27031 - a guideline for ICT readiness for business continuity  ISO/IEC 27032 - a guideline for cybersecurity (essentially, 'being a good neighbor' on the Internet)  ISO/IEC 27033 - IT network security, a multi-part standard based on ISO/IEC 18028:2006  ISO/IEC 27034 - a guideline for application security
Questions What relevant information security experience, contacts, or interest do you have? What tools and capabilities can you bring to the table to increase the efficiency of the assessments?

More Related Content

PPT
Data Privacy in India and data theft
PPTX
Privacy & Data Protection
PDF
10 Things You Need To Know About Privacy
PPT
Data protection in_india
PPTX
Presentation on GDPR
PPTX
EU GDPR (training)
PDF
GDPR-Overview
PPT
Data protection act
Data Privacy in India and data theft
Privacy & Data Protection
10 Things You Need To Know About Privacy
Data protection in_india
Presentation on GDPR
EU GDPR (training)
GDPR-Overview
Data protection act

What's hot (20)

PPTX
Unit 6 Privacy and Data Protection 8 hr
PDF
Privacy & Data Protection in the Digital World
PDF
Overview on data privacy
PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PPTX
Personally Identifiable Information – FTC: Identity theft is the most common ...
PPTX
Texas Privacy Laws - Tough New Changes
PPT
Mass Information Security Requirements January 2010
PPTX
Data protection
PPTX
EU Data Protection Legislation, Peter Ridley (HPE)
PPTX
Are you GDPR ready?
PPT
Privacy and personal information
PPTX
General Data Protection Regulation (GDPR)
PDF
Week Of 2009 08 31
PPTX
Information privacy and Security
PPTX
GDPR - Fail to Prepare, Prepare to Fail!
PPT
Privacy and Data Security: Risk Management and Avoidance
PPTX
2018 01-25 Introduction to PCI and HIPAA Compliance
PPT
Data Protection Act
PPTX
Data Protection: Transitioning to the GDPR
PPT
Personal Data Privacy and Information Security
Unit 6 Privacy and Data Protection 8 hr
Privacy & Data Protection in the Digital World
Overview on data privacy
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Personally Identifiable Information – FTC: Identity theft is the most common ...
Texas Privacy Laws - Tough New Changes
Mass Information Security Requirements January 2010
Data protection
EU Data Protection Legislation, Peter Ridley (HPE)
Are you GDPR ready?
Privacy and personal information
General Data Protection Regulation (GDPR)
Week Of 2009 08 31
Information privacy and Security
GDPR - Fail to Prepare, Prepare to Fail!
Privacy and Data Security: Risk Management and Avoidance
2018 01-25 Introduction to PCI and HIPAA Compliance
Data Protection Act
Data Protection: Transitioning to the GDPR
Personal Data Privacy and Information Security
Ad

Viewers also liked (8)

PPTX
Shooting schedule
PPS
Tulipsof holland
PPTX
ART SALE
PDF
Garvan breakthrough_dec_issue
PDF
Breakthrough April 2014
PPT
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
PPTX
Cd cover analysis
PPT
eZine Marketing - Writing Newsletters - Internet Business Know-How
Shooting schedule
Tulipsof holland
ART SALE
Garvan breakthrough_dec_issue
Breakthrough April 2014
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Cd cover analysis
eZine Marketing - Writing Newsletters - Internet Business Know-How
Ad

Similar to Law firm information security overview focus on encryption by dave cunningham and meg block mar 2010 (20)

PPT
201 CMR 17.00
PPT
The New Massachusetts Privacy Rules (February 2, 2010)
PDF
MA 201 CMR 17.00 Personal Identity Security
PPT
Data Risks In A Digital Age
PPTX
Presentation On Mass Data Privacy Law
PPT
The New Massachusetts Privacy Rules V4
PPT
The New Massachusetts Privacy Rules V4
PPT
The New Massachusetts Privacy Rules V4
PPT
MA Privacy Law
PDF
Advisory April Showers 02.19.2009
PDF
MeHI Privacy & Security Webinar 3.18.15
PPTX
The new massachusetts privacy rules v5.35.1
PPTX
2011 hildebrandt institute cio forum data privacy and security presentation...
PPTX
Privacy for tech startups
PDF
Leading Practices in Information Security & Privacy
PPT
Ais Romney 2006 Slides 08 Is Control2
PPT
Ais Romney 2006 Slides 08 Is Control2
PPTX
IQPC eDiscovery Goverment - Washington D.C.
PPT
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
PDF
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
201 CMR 17.00
The New Massachusetts Privacy Rules (February 2, 2010)
MA 201 CMR 17.00 Personal Identity Security
Data Risks In A Digital Age
Presentation On Mass Data Privacy Law
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
MA Privacy Law
Advisory April Showers 02.19.2009
MeHI Privacy & Security Webinar 3.18.15
The new massachusetts privacy rules v5.35.1
2011 hildebrandt institute cio forum data privacy and security presentation...
Privacy for tech startups
Leading Practices in Information Security & Privacy
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
IQPC eDiscovery Goverment - Washington D.C.
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji

More from David Cunningham (20)

PPTX
The business of data analytics and business intelligence 15 nov 2016
PDF
50 Shades of Metrics
PPTX
CLOC Legal Project Management and Simple RFPs
PDF
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
PPT
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
PPT
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
PDF
Ilta06 developing and selling an enterprise risk management approach by dave ...
PPT
Establishing a framework for it governance by dave cunningham 2007
PPT
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
PPT
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
PPT
Ilta 2009 law firm risk management can it grow profitability - panel member...
PDF
Out with the old it in with the new by david cunningham - sep 2009
PPT
Managing partner retreat using technology to streamline the practice of law...
PDF
Law journal news it is dead article; long live it controlling costs while g...
PDF
Risk management for law firms chapter 1 ark 2009 by dave cunningham
PDF
Risk management for law firms chapter 2 ark 2009 by meg block
PDF
Trends shaping the future of legal risk management by dave cunningham and m...
PDF
Ltn 2010 02 risk glossary by dave cunningham on page 23
PPT
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
PPT
Ala 2005 rfp best practices by dave cunningham apr 2005
The business of data analytics and business intelligence 15 nov 2016
50 Shades of Metrics
CLOC Legal Project Management and Simple RFPs
Iltacon cio corporate legal operations consortium (cloc) metrics aug 2015
ALA 2005 Outsourcing - Making a Decision that Fits by Dave Cunningham Apr 2005
Ilta 2005 - Evaluating Managed Services - Benchmarks and Case Studies by Dave...
Ilta06 developing and selling an enterprise risk management approach by dave ...
Establishing a framework for it governance by dave cunningham 2007
Ilta 2008 challenges in demonstrating it payoff presentation by dave cunningh...
Lit con 2009 collaborate to mitigate panel - facilitated by dave cunningham...
Ilta 2009 law firm risk management can it grow profitability - panel member...
Out with the old it in with the new by david cunningham - sep 2009
Managing partner retreat using technology to streamline the practice of law...
Law journal news it is dead article; long live it controlling costs while g...
Risk management for law firms chapter 1 ark 2009 by dave cunningham
Risk management for law firms chapter 2 ark 2009 by meg block
Trends shaping the future of legal risk management by dave cunningham and m...
Ltn 2010 02 risk glossary by dave cunningham on page 23
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
Ala 2005 rfp best practices by dave cunningham apr 2005

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
A Presentation on Touch Screen Technology
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Hybrid model detection and classification of lung cancer
PDF
Encapsulation theory and applications.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
1. Introduction to Computer Programming.pptx
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
A Presentation on Touch Screen Technology
Chapter 5: Probability Theory and Statistics
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A novel scalable deep ensemble learning framework for big data classification...
cloud_computing_Infrastucture_as_cloud_p
Zenith AI: Advanced Artificial Intelligence
Assigned Numbers - 2025 - Bluetooth® Document
1 - Historical Antecedents, Social Consideration.pdf
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
NewMind AI Weekly Chronicles - August'25-Week II
Hybrid model detection and classification of lung cancer
Encapsulation theory and applications.pdf
DP Operators-handbook-extract for the Mautical Institute
Unlocking AI with Model Context Protocol (MCP)
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
1. Introduction to Computer Programming.pptx

Law firm information security overview focus on encryption by dave cunningham and meg block mar 2010

  • 1. Simplifying Law Firm Information Security Compliance - An Executive Briefing Prepared by: David Cunningham, Managing Director Meg Block, Managing Director March 2010 Excerpt with a Focus on Encryption
  • 2. Table of Contents Summary of Relevant Regulatory Information Key Regulatory Issues Focus on Encryption Expectations
  • 3. Relevant Information Security Regulations HI-TECH makes Health Information Portability and Accountability Act (HIPAA) relevant to law firms as “business associates” of covered health care entities International Traffic in Arms Regulations (ITAR) 2009 Massachusetts Standard for the Protection of Personal Information of Residents of the Commonwealth 201 CMR 17.00 implements the provisions of Massachusetts General Law 93H aka Massachusetts Data Privacy Law US EU Safe Harbor Framework Red Flags Rule International Standards Organization (ISO) 27001-2005
  • 4. Regulatory Summary March 1, 2010 $5,000 per incident plus costs of investigation, litigation and legal fees, plus potential civil penalties “ Personal information about a resident of the Commonwealth” of Massachusetts State of Massachusetts Massachusetts Data Privacy Law February 17, 2010 $100 - $50,000 per incident; $1.5M max per year. “ Protected Health Information” aka PHI Health and Human Services HIPAA / HI-TECH Voluntary (replaces Data Transfer Agreements) Up to $12,000 per day for violations Personal information transferred to or from 27 Members States of the European Union US Dept of Commerce / Federal Trade Commission Safe Harbor 60 days in advance of any intended sale or transfer to a foreign person of ownership or control Per violation, civil fines up to $500K; criminal penalties up to $1M and 10 years imprisonment “ Export of technical data and classified defense articles”, as defined by the US Munitions List US Department of State ITAR None at this time Currently not applicable to law firms due to ABA objections, but the FTC is appealing Personal identifying information (PII is PHI plus credit card, tax ID, insurance claim, background checks, etc.) Federal Trade Commission Red Flags Rule Regulation Governing Body Information Addressed Penalties Law Firm Compliance Date ISO 27001 International Standards Organization (ISO) Determined by company and its auditor via Statements of Applicability None Voluntary
  • 5. Regulatory Compliance Actions None Designation of people to maintain Disciplinary actions for violations Third party adherence Maintain security system/program Response actions Written Information Security Plan; security policies Identify MA personal info; identify and assess internal and external threats Massachusetts Data Privacy Law None Administrative, Physical and Technical safeguards Business Associate Agreements Breach notification procedures Information Security Policy; DR plan Identify PHI; review information system activity HIPAA / HI-TECH Self-Registration with the US Department of Commerce, plus annual reaffirmations User awareness, notice, and choice (opt-in or opt-out) Third party adherence Compliance verification mechanisms, including annual reaffirmations Dispute resolution service Privacy Policy and Privacy Statement Identify PI Safe Harbor Registration with the Directorate of Defense Trade Controls Registration application None Indentify data and systems relevant to US Munitions List ITAR Regulation Assessment Plans and Policies Procedures Needed Registration or Audit ISO 27001 Review policies, objectives, and procedures relevant to info security Information Security Management System Plan (Establish ISMS) Do (Implement and operate the ISMS) Check (Monitor and review the ISMS) Act (Maintain and improve the ISMS) Audit by ISO auditor every two years
  • 6. Massachusetts Data Privacy Law Indicative of an emerging legislative trend Similar law in Nevada (but applicable only when doing business in Nevada) New Jersey, Washington, and Michigan are working on privacy legislation Assumed to be eventually trumped by a federal regulation
  • 7. Massachusetts Data Privacy Law Excerpt on access control and encryption “… establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, shall have the following elements: (2) Secure access control measures that: (a) restrict access to records and files containing personal information to those who need such information to perform their job duties; and (3) Encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data containing personal information to be transmitted wirelessly. (5) Encryption of all personal information stored on laptops or other portable devices;”
  • 8. Massachusetts Data Privacy Law Clarifications “ All of the computer security provisions apply to a business if they are technically feasible.” “Technically feasible” means that if there is a reasonable means through technology to accomplish a required result, then that reasonable means must be used. Risk-based approach A risk-based approach is one that directs a business to establish a written security program that takes into account the particular business' size, scope of business, amount of resources, nature and quantity of data collected or stored, and the need for security. Both the statute and the regulations specify that security programs should take into account the size and scope of your business, the resources that you have available to you, the amount of data you store, and the need for confidentiality. This will be judged on a case by case basis.
  • 9. Massachusetts Data Privacy Law * Answers are excerpts from the Commonwealth of Massachusetts’ FAQ Regarding 201 CMR 17.00 “ You must encrypt backup tapes on a prospective basis. However, if you are going to transport a backup tape from current storage, and it is technically feasible to encrypt (i.e. the tape allows it) then you must do so prior to the transfer. If it is not technically feasible, then you should consider the sensitivity of the information, the amount of personal information and the distance to be traveled and take appropriate steps to secure and safeguard the personal information.” Backup Tapes Yes, “but only those portable devices that contain personal information of customers or employees and only where technically feasible. The "technical feasibility" language of the regulation is intended to recognize that at this period in the development of encryption technology, there is little, if any, generally accepted encryption technology for most portable devices, such as cell phones, blackberries, net books, iPhones and similar devices. While it may not be possible to encrypt such portable devices, personal information should not be placed at risk in the use of such devices. There is, however, technology available to encrypt laptops.” Portable Devices “ You are responsible for the selection and retention of a third-party service provider who is capable of properly safeguarding personal information.” Third Parties “ If it is not technically feasible to do so, then no. However, you should implement best practices by not sending unencrypted personal information in an email. There are alternative methods to communicate personal information other through email, such as establishing a secure website that requires safeguards such as a username and password to conduct transactions involving personal information.” E-Mail with Personal Information Asset Encryption Expectations*
  • 10. Massachusetts Data Privacy Law Further clarifications Do communications with clients already covered by the attorney-client privilege immunize me from complying with 201 CMR 17.00? No. If you own or license personal information, you must comply with 201 CMR 17.00 regardless of privileged or confidential communications. Do I have to do an inventory of all my paper and electronic records? No, you do not have to inventory your records. However, you should perform a risk assessment and identify which of your records contain personal information so that you can handle and protect that information. Does 201 CMR 17.00 set a maximum period of time in which I can hold onto/retain documents containing personal information? No. That is a business decision you must make. However, as a good business practice, you should limit the amount of personal information collected to that reasonably necessary to accomplish the legitimate purpose for which it is collected and limit the time such information is retained to that reasonably necessary to accomplish such purpose. You should also limit access to those persons who are reasonably required to know such information.
  • 11. ITAR Process Register with the Directorate of Defense Trade Controls The USPTO’s patent web portal now requires certification of compliance before users may log into the system. Easy to have violations “… disclosure or transfer to a foreign national, even if within U.S. borders .” “… proprietary company information is not considered to be in the public domain.”
  • 12. Safe Harbor “ The FTC and DoT have both stated in letters to the European Commission that they can take enforcement action against organizations that state they are in compliance with the Safe Harbor, but then fail to live up to their statements.” Of large firms, only Shearman & Sterling is current registered
  • 13. ISO 27001 Family of Standards ISO certification is most relevant for government clients, but is a helpful overlay for all regulatory requirements Published standards ISO/IEC 27000 — Information security management systems — Overview and vocabulary ISO/IEC 27001 — Information security management systems — Requirements ISO/IEC 27002 — Code of practice for information security management (previously ISO/IEC 17799:2005) ISO/IEC 27003 — Information security management system implementation guidance ISO/IEC 27004 — Information security management — Measurement ISO/IEC 27005 — Information security risk management ISO/IEC 27006 — Requirements for bodies providing audit and certification of IS management systems ISO/IEC 27007 — Guidelines for information security management systems auditing ISO/IEC 27011 — Info security management guidelines for telecom organizations based on ISO/IEC 27002 In draft ISO/IEC 27008 - a guideline for Information Security Management auditing (focus on security controls) ISO/IEC 27013 - a guideline on the integrated implementation of ISO/IEC 20000-1 and ISO/IEC 27001 ISO/IEC 27014 - an information security governance framework ISO/IEC 27015 - information security management guidelines for the finance and insurance sectors ISO/IEC 27031 - a guideline for ICT readiness for business continuity ISO/IEC 27032 - a guideline for cybersecurity (essentially, 'being a good neighbor' on the Internet) ISO/IEC 27033 - IT network security, a multi-part standard based on ISO/IEC 18028:2006 ISO/IEC 27034 - a guideline for application security
  • 14. Questions What relevant information security experience, contacts, or interest do you have? What tools and capabilities can you bring to the table to increase the efficiency of the assessments?

Editor's Notes

  • #12: Technical data means: (1) Information, other than software as defined in §120.10(a)(4), which is required for the design, development, production, manufacture, assembly, operation, repair, testing, maintenance or modification of defense articles. This includes information in the form of blueprints, drawings, photographs, plans, instructions or documentation. (2) Classified information relating to defense articles and defense services; (3) Information covered by an invention secrecy order; (4) Software as defined in §121.8(f) of this subchapter directly related to defense articles; (5) This definition does not include information concerning general scientific, mathematical or engineering principles commonly taught in schools, colleges and universities or information in the public domain as defined in §120.11. It also does not include basic marketing information on function or purpose or general system descriptions of defense articles.
  • #13: Process Privacy policy and a privacy policy statement that conform to the Safe Harbor principles Define the roles and procedures relevant to the actions necessary to support the privacy policy, including: Ensuring individuals are aware of the Firm’s policy, aware of their own personal information stored by the Firm, able to make corrections, and able to opt-in or opt-out of sharing it (termed Notice and Choice by Safe Harbor). Verifying third-party compliance with the notice and choice requirements (or adherence to Safe Harbor principles) Defining compliance verification mechanisms, including annual reaffirmations (internal or third party) Selecting a relevant dispute resolution service Establishing a mechanism for ongoing internal compliance notifications and reminders