On-Demand: January 9, 2024
Select Your State Below to View CLE Credit Information
Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs
The presentation will begin with a brief discussion of the current privacy and cybersecurity landscape, emphasizing the importance of understanding and adapting to emerging trends and will delve into these burgeoning trends, offering an overview of key privacy laws in the United States.
It will also explore commonly litigated statutes such as the FCRA, DPPA, CCPA, VPPA, BIPA, state wiretap laws, state medical information statutes, and common law claims, as well as it will offer guidance on how businesses can proactively manage its privacy practices in lieu of litigation trends.
The subsequent section will distinguish between privacy and information security, providing guidance on how businesses can ensure both. Moreover, the presentation will offer insight into the importance of safeguarding personal information and strategies that businesses can employ to ensure the security of such information and followed by a brief section offering best practices for responding to data breaches and strategies for businesses to minimize damage and ensure swift recovery.
Overall, this presentation aims to provide an overview of the current and evolving privacy and cybersecurity landscape, offering valuable insights and practical strategies for businesses to navigate regulatory complexities, respond to emerging trends, and ensure effective implementation and compliance.
This course is co-sponsored with myLawCLE.
Key topics to be discussed:
Closed-captioning available
Robyn W. Lin | Troutman Pepper Hamilton Sanders LLP
Robyn is an associate in the firm’s Privacy + Cyber practice who focuses on helping clients understand and maintain data compliance. She regularly assists clients with all aspects of their privacy programs, including an initial assessment of applicable law, policy drafting, and implementation. Her practice also includes regulatory assessments and serving as an expert for mergers and acquisitions. Robyn also provides ongoing commentary on developments within privacy and cybersecurity, and serves as assistant editor of More Privacy Please, the firm’s monthly newsletter recapping industry and legal developments in the areas of cybersecurity, information governance, and privacy.
Natasha E. Halloran | Troutman Pepper Hamilton Sanders LLP
Natasha is an associate in the firm’s Privacy + Cyber practice, where she assists clients with privacy-related issues such as reviewing privacy policies, regulatory compliance, and due diligence for mergers and acquisitions. Her practice also includes commercial litigation, business disputes, and class-action litigation under consumer protection statutes, such as the Fair Credit Reporting Act (FCRA) and Video Privacy Protection Act (VPPA). Prior to joining the firm, Natasha served as a law clerk for the Honorable Robert S. Ballou at the U.S. District Court for the Western District of Virginia.
Karla Ballesteros | Troutman Pepper Hamilton Sanders LLP
Karla is an associate in the firm’s Privacy + Cyber practice. Her daily work includes counseling clients through the initial incident response, potential ransom payment, restoration, data mining, and notification segments of the incident response practice. She also leads efforts to identify and remediate shortcomings in cybersecurity and privacy practices of clients. Prior to joining the firm, Karla was a cyber services manager for the Beazley Group, offering proactive risk management guidance to clients seeking to improve their controls and mitigate risks before an incident occurs. Over the span of her career, she has handled more than 500 active cybersecurity incidents.
I. Current privacy and cybersecurity landscape | 2:00pm – 2:05pm
II. Emerging Trends | 2:05pm – 2:15pm
III. Commonly Litigated Statutes | 2:15pm – 2:25pm
IV. Typical Rhythm – Standard, Damages, Class Certification | 2:25pm – 2:35pm
V. HIPAA/Cookie Use | 2:35pm – 2:45pm
VI. Key Privacy laws in the United States and Key Terms | 2:45pm – 3:00pm
Break | 3:00pm – 3:10pm
VII. Impact on Implementation and Compliance | 3:10pm – 3:20pm
VIII. Privacy Policies | 3:20pm – 3:25pm
IX. Privacy vs. Information Security | 3:25pm – 3:35pm
X. Breach Responses | 3:35pm – 3:40pm