SlideShare a Scribd company logo
Underwri(en	by:	 Presented	by:	
#AIIM	Informa(on	Is	Your	Most	Important	Asset.		
Learn	the	Skills	to	Manage	It.		
Data	Privacy	–	
Solving	Negligence,	Bad	Prac(ces,	
Access	Control,	and	Compliance	Issues	
Presented	September	20,	2017		
Data	Privacy:		Solving	Negligence,	Bad	Prac(ces,	
Access	Control,	and	Compliance	Issues	
An	AIIM	Webinar	Presented	September	20,	2017
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Control, and Compliance Issues
Underwri(en	by:	 Presented	by:	
Bob	Siegel	
CIPM,	CIPT,	CIPP/US/G/E/C	
President	
Privacy	Ref,	Inc.	
Olga	Kurts	
Product	Manager	
DocEx,	Inc.		
Host:		Theresa	Resek,	CIP	
Director	
AIIM	
Today’s	Speakers
Underwri(en	by:	 Presented	by:	
Bob	Siegel	
Fellow	of	Informa(on	Privacy	
(CIPM,	CIPT,	CIPP/US/G/E/C)	
President	
Privacy	Ref,	Inc.	
Introducing	our	Featured	Speaker
Underwri(en	by:	 Presented	by:	
Privacy	
An	individual’s	right	to	control	the	collecQon,	
use	and	disclosure	of	personal	informaQon.	
The	appropriate	use	of	personal	informaQon	
given	the	circumstances	
What	is	privacy?	
You	can	have	security	without	privacy,	but	you	cannot	have	privacy	without	security	
Security	
Safe-guarding	an	organizaQon's	data	from	
unauthorized	access	or	modificaQon	to	
ensure	its	availability,	confidenQality,	and	
integrity
Underwri(en	by:	 Presented	by:
Underwri(en	by:	 Presented	by:	
Data	breach	responsibili(es	
Detect		
the	event	
Diagnose	the	
event	
Determine	
the	data	loss	
“Stop	the	bleeding”	
Fix	the		
root	cause	
Is	this	a	
“data	breach”?	
NoQficaQon	
Complaints	
&	Inquiries	
Security	
Privacy	
RemediaQon	
Offer(s)
Underwri(en	by:	 Presented	by:	
53%	of	data	breaches	are	addressable	
Negligence,	Bad	
PracQces,	Access	
Control,	and	
Compliance	Issues	
contribute	to	
human	error	and	
system	glitches	 Source:	2017	Cost	of	Data	Breach	Study,	Ponemon	InsQtute
Underwri(en	by:	 Presented	by:	
Contribu(ng	factors	
Organiza(onal	 Individuals	
Negligence	 No	guidance	
IneffecQve	training/awareness	
IneffecQve	controls	
Doing	“the	right	thing”	
Bad	PracQces	 Ignoring	requirements	
Immature	privacy	program	
No	consequences	
Access	Control	 Unfe(ered	access	
AddiQve	access	
Compliance	 “Ignorance	is	bliss”	
“The	business	units	own	compliance”
Underwri(en	by:	 Presented	by:	
Components	of	a	privacy	program	
Policy	
Compliance	
Training	&	
Awareness	
Alignment	
Statutes,	
RegulaQons,	&	
Other	External	
Requirements	
Public	
Opinion
Underwri(en	by:	 Presented	by:	
Alignment
Underwri(en	by:	 Presented	by:	
Opera(onal	privacy	risks	
CollecQon	
Use	
Sharing	
Storage	
Over	collecQon	
Right	to	access	
Right	to	recQficaQon	
CollecQon	
Undisclosed	purpose	
No	legal	basis	
Test	usage	
Right	to	object	
Use	
Undisclosed	transfer	
Data	export	limits	
Third	party	pracQces	
Right	to	be	forgo(en	
Sharing	
Over	retenQon	
Insecure	storage	
Right	to	erasure	
Archived	informaQon	
Storage
Underwri(en	by:	 Presented	by:	
Preven(ng	human	error	and	system	glitches		
Opera(onal	
Privacy	
Process	
Technology	
Training	
Awareness	
Audits	
Self	
Assessments	
Whistle	
blowing
Underwri(en	by:	 Presented	by:	
Addressing	the	contribu(ng	factors	
Organiza(onal	Factors	 Mi(ga(on	Approaches	
Negligence	 No	guidance	
IneffecQve	training/awareness	
IneffecQve	controls	
Polices,	standards,	etc.	
AcQve	awareness	program	
EffecQve	controls	
Bad	PracQces	 Ignoring	requirements	
Immature	privacy	program	
No	consequences	
Data	/	requirements	inventory	
GAPP	analysis	
Documented	enforcement	
Access	Control	 Unfe(ered	access	
AddiQve	access	
HR	/	Security	coordinaQon	
Quarterly	access	reviews	
Compliance	 “Ignorance	is	bliss”	
“The	business	units	own	compliance”	
Privacy	by	Design	
Privacy	Impact	Assessments	
Central	compliance	program	
Hybrid	privacy	program	structure
Underwri(en	by:	 Presented	by:	
Ques(ons?	
Bob	Siegel	
§  E:	 	Bob.Siegel@PrivacyRef.com		
§  W:	 	www.privacyref.com		
§  T: 	888-470-1528	x801	
§  D:	 	508-474-5125	
§  Tw:	 	@PrivacyRef
Underwri(en	by:	 Presented	by:	
Olga	Kurts	
Product	Manager	
DocEx,	Inc.		
Introducing	our	Speaker
KNOW YOUR
THREAT
MODELS
& THEIR
IMPACTS
SENSITIVE DATA
PHI, PIFI, PII
Research Reports
Clinical Data
Mergers & Acquisitions
Regulatory Affairs
Legal Briefs
Corporate Communications
Internal Risks
Data stored inside your
firewall in various
applications.
Sensitive data can be
shared through system-to-
system, or human-to-
human, or through
system-to-human
interactions.
External
Risks
Sharing data externally
with your partners,
customers, regulators,
etc.
Sensitive data moves out
of your firewall.
Cloud applications will
send your data outside
the firewall, manually or
automatically.
Regulations & Compliance
Regulatory compliance and violations (e.g. GDPR,
NIST, GLBA, Privacy Shield, Communications Act, etc.)
can be expensive for your company even without any
breaches.
A SMALL MN LAW FIRM CHALLENGES
Proof of
Receipt
Proof of receipts,
downloads, views,
prints, and forwards.
Opposition (e.g. pro-se) claims
briefings not received.
Confidential matter details
forwarded to third parties
without proper authority or
notifications.
Business Impact: Prolonged
case resolution, judge
mandates lengthy process,
added cost for client.
Access
Control
Grant/revoke access,
control expiration,
comprehensive audit
report.
Attorneys and team members
changes on matters still
retains access to case
materials.
Managing multiple copies and
versions of confidential
documents in multiple places
while being shared.
Business Impact: Potential
data breach, compliance
violation.
Explicit
Consent
Record explicit
consent.
Some family and intellectual
property matters required
explicit consent management
on various matters.
Business Impact: Better and
more simplified records
management.
Secure yet
Simple
High security yet easy
to use.
Users include partners,
paralegals, junior associates,
opposing counsel, and clients.
Business Impact: Consolidation
of several smaller solutions.
There are siloed solutions for each of
these challenges in the market.
A SaaS solution for
external
communications of
sensitive content.
Create
Templates
1.  Understand case
types, requirements,
challenges.
2.  Using subset of 100+
features, build three
templates
Friendly
Experience
3.  Enable complex
policies and security
4.  Make is simple for all
users
Track & Control
5.  Complete access
control
6.  Record all actions
7.  Record by recipients,
documents, locations,
and total history
Track & Control
5.  Complete access control
6.  Record all actions
7.  Record by recipients,
documents, locations,
and total history
8.  Drill down further
9.  Download proof-of-
compliance
KNOW YOUR
THREAT
MODEL
SENSITIVE DATA
PHI, PIFI, PII
Research Reports
Clinical Data
Mergers & Acquisitions
Regulatory Affairs
Legal Briefs
Corporate Communications
More
Features
Bates Numbering
Water Marks
Service Levels
Geo Location Rules
Live Analytics
Proactive Alerts
Additional Security
(e.g. BYOK, multi-
factor authentication)
Additional Resources
General Information: https://www.DocEx.com
Selected Product Videos:
https://www.DocEx.com/videos
White Papers:
https://www.DocEx.com/whitepapers
Contact Us: contact@DocEx.com
More Use-
cases
International Trade
Corporate Development
Business Development
Compliance with GDPR,
NIST, GLBA, Privacy Act,
etc.
Clinical Trials, Safety
Reports
Research Collaboration
Investor/analyst reporting
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Control, and Compliance Issues
Underwri(en	by:	 Presented	by:	
#AIIM	Informa(on	Is	Your	Most	Important	Asset.		
Learn	the	Skills	to	Manage	It.		Informa(on	is	your	most	important	asset.	
Learn	the	skills	to	manage	it.

More Related Content

PDF
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
PDF
[Webinar Slides] Workflow and Process Security Checking the Locks
PPTX
A Guide to Disaster Preparedness for Businesses
PDF
Cyber Security 101: What Your Agency Needs to Know
PPTX
Cybersecurity Risks for Businesses
PDF
Good-cyber-hygiene-at-scale-and-speed
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Workflow and Process Security Checking the Locks
A Guide to Disaster Preparedness for Businesses
Cyber Security 101: What Your Agency Needs to Know
Cybersecurity Risks for Businesses
Good-cyber-hygiene-at-scale-and-speed
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...

What's hot (14)

PDF
OS17 Brochure
PPTX
Netwatcher Credit Union Tech Talk
PPT
December ISSA Meeting Executive Security Presentation
PDF
Industrial Control Security USA Sacramento California Oct 6/7
PPTX
20160426 AIIM16 CIP Preconference Briefing
PDF
The State of Cyber
PDF
IDC Best Practices in Private Sector Cyber Security
PPTX
Protecting Your IP: Data Security for Software Technology
PDF
Privacy by design
PDF
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
PDF
Cyber Secuirty Visualization
PPTX
Can Cyber Insurance Enforce Change in Enterprise GRC
PDF
ACGSV_Feb11_Keynote_Program
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
OS17 Brochure
Netwatcher Credit Union Tech Talk
December ISSA Meeting Executive Security Presentation
Industrial Control Security USA Sacramento California Oct 6/7
20160426 AIIM16 CIP Preconference Briefing
The State of Cyber
IDC Best Practices in Private Sector Cyber Security
Protecting Your IP: Data Security for Software Technology
Privacy by design
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
Cyber Secuirty Visualization
Can Cyber Insurance Enforce Change in Enterprise GRC
ACGSV_Feb11_Keynote_Program
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Ad

Similar to [Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Control, and Compliance Issues (20)

PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
Security and Privacy: What Nonprofits Need to Know
PDF
A Case For Information Protection Programs
PDF
How to Build a Privacy Program
PPT
Security solutions for a smarter planet
PDF
Spotlight on Technology 2017
DOCX
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
DOCX
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
PPT
3 oraclex evento reg puglia_v2017-09-14-2
PPTX
ISMS User_Awareness Training.pptx
PDF
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
DOCX
Ethnosit.net
PPTX
Challenges & Opportunities the Data Privacy Act Brings
PPTX
Information security
PPT
Information security management v2010
PDF
Slides to the online event "Creating an effective cybersecurity strategy" by ...
PDF
Small Business Administration Recommendations
PPTX
Cloud Storage and Security: Solving Compliance Challenges
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
BSIDES DETROIT 2015: Data breaches cost of doing business
Tech Talent Meetup Hacking Security Event Recap
Security and Privacy: What Nonprofits Need to Know
A Case For Information Protection Programs
How to Build a Privacy Program
Security solutions for a smarter planet
Spotlight on Technology 2017
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
3 oraclex evento reg puglia_v2017-09-14-2
ISMS User_Awareness Training.pptx
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Ethnosit.net
Challenges & Opportunities the Data Privacy Act Brings
Information security
Information security management v2010
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Small Business Administration Recommendations
Cloud Storage and Security: Solving Compliance Challenges
Ad

More from AIIM International (20)

PPTX
2022 IIM Infographic.pptx
PPTX
Create, Capture, Collaborate - Your Content Drives Organizational Value
PPTX
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
PDF
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
PDF
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
PDF
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
PDF
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
PDF
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
PDF
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
PDF
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
PDF
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
PDF
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
PDF
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
PDF
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
PDF
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
PDF
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
PDF
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
PDF
[Webinar Slides] Modern Problems Require Modern Solutions
PDF
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
PDF
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
2022 IIM Infographic.pptx
Create, Capture, Collaborate - Your Content Drives Organizational Value
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Machine Learning_overview_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
NewMind AI Weekly Chronicles - August'25-Week II
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine Learning_overview_presentation.pptx
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4

[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Control, and Compliance Issues