13
Rob Cutbirth, Partner, SF Avril Love, Counsel, LA Piecing Together Data Policies that Make Sense in an Ever-Changing World

Topic 2 Cutbirth and Love

Embed Size (px)

Citation preview

Page 1: Topic 2 Cutbirth and Love

Rob Cutbirth, Partner, SF Avril Love, Counsel, LA

Piecing Together Data Policies that Make Sense in an Ever-Changing World

Page 2: Topic 2 Cutbirth and Love

Motivations to Create a Policy1. Regulatory Standards:

HIPAA-HITECH/State Privacy Laws/FERPA2. Governance and Risk Management Standards:

Publicly Traded Companies/Board Standards/Insurance Rqmts/3. Financing/Customer Standards:

Lender-Imposed & Customer Requirements4. Internal Events:

The Boss, Who Heard At The Club That …; An Actual/PotentialSecurity Scare; Someone attending a Seminar at Tucker Ellis!

Page 3: Topic 2 Cutbirth and Love

Some of the Basic Constraints1. Practicality:

Location/Systems/Personal Devices/Employee Skill sets

2. Enforceability: You must be able to enforce and you must enforce

3. Training: You must be able to develop a training program to share information and consequences

Page 4: Topic 2 Cutbirth and Love

And Then These Turn Up the Heat On You

But If We Do That …

• It Will Make It Tougher To Use Our Systems/Not “User Friendly”

• It’s Really Not Going To Change Anything, so Why Do it

• It’s Going To Cost More

I Need My Own Special Policy Because…

• My Content Is Different

• My Department Needs Greater Flexibility

• I’m In A Different State/City/Type of Operation

Page 5: Topic 2 Cutbirth and Love

Against these Challenges, How Do You Build a Strong and Defensible Data Security Policy?

First, Know Your:

• Legal Obligations & LimitationsInt’l; US/State/Industry

• Risks – Real and “Unreal”Industry and Data Driven

• Goals and ExpectationsWho Needs it/Who Wants it/When is it Needed/Who is Covered

• Systems/EnvironmentWhat can you Impose Given Your Hardware/Software Systemsand Limitations, and Your Vendor’s Systems

Page 6: Topic 2 Cutbirth and Love

Second, Know Your Drafting Rules and Requirements

Cover a Majority of

IssuesMeet Language

Barriers

Create a Longer-

Lasting Version Draft to Get

Approvals

Page 7: Topic 2 Cutbirth and Love

Let’s Start to Build a Personal Device Security Policy*

• Some Of The Key Issues:– Personal v. Company Devices– Nature Of Information Accessed And Stored– Protective Corporate Software/Apps– Separation From Employment– Lost/Stolen Phones and Phone Replacement– Passwords/Access To The Device By Non-Employees– To Whom Does the Policy Apply

*Does Not Include Other Issues That Should be in a Personal Device Policy:• Expense Reimbursement · Exempt v. Nonexempt Use

• Improper/Acceptable Use

Page 8: Topic 2 Cutbirth and Love

The Policy – How We Might Build It …

• Opening Sentence – Why we have the PolicyIn meeting our legal and contractual obligations, and to avoid harm to the Company’s operations and business relationships, each of our employees and vendors must take reasonable and necessary steps to protect the personal, confidential, and proprietary information of the Company, our employees, and our customers and business partners (“Confidential Information”).

• Second Sentence – The Big Picture ObligationTo meet this obligation, our employees and vendors must diligently ensure that Confidential Information cannot be inappropriately accessed from their personal and business cellular telephones, tablets, or similar devices (“Personal Device”).

Page 9: Topic 2 Cutbirth and Love

• Third Sentence – The ConsequencesEmployees failing to comply with these obligations may face discipline. Vendors’ employees failing to comply with these obligations may have their contracts terminated. In appropriate circumstances, breach of these obligations may also result in regulatory or law enforcement officials being notified.

Page 10: Topic 2 Cutbirth and Love

• The Fourth Sentence – The “Rules”Protective actions required to be taken include:• The immediate reporting to __________________ of a

lost or stolen device, or an actual or potential security breach. You must then follow their direction and guidance.

• The use of password protection on any Personal Device used to access or transmit Confidential Information. Because only you are authorized to access or use Confidential Information from your Personal Device, passwords must not be shared with family members, friends, or others who could accidentally or intentionally access Confidential Information, placing you, the Company, and the accessing party at risk.

Page 11: Topic 2 Cutbirth and Love

• The installation on your Personal Device of the ___________ application, which provides additional security for the device. In the case of a lost or stolen Personal Device, the Program can erase all Confidential Information and/or track the location of the device. The tracking feature of the program is only used in response to notice of a lost or stolen Personal Device.

• The removal of all Confidential Information, and programs or applications used to access Confidential Information, before you sell, gift, trade-in, or otherwise dispose of a Personal Device, or upon your separation from the Company. You must notify _______________________ to assist with this process.

Page 12: Topic 2 Cutbirth and Love

You Should Also Tie in Vendors

• For vendors whose employees may have access to Confidential Information, our contracts will include a provision stating they will, at a minimum, comply with our Data Security Policies and Procedures, with their employees advised of these obligations.

Page 13: Topic 2 Cutbirth and Love

Avril Love, Counsel515 South Flower Street

Forty-Second FloorLos Angeles, CA 90071

213.430.3306 (direct dial)

Rob Cutbirth, PartnerOne Market Plaza

Steuart Tower, Suite 700San Francisco, CA 94105

415-617-2235 [email protected]

Questions?