Imagine you are in house at a digital/eCommerce company and your business team approaches you with plans to start selling internationally. They regale you with grand promises from global payment providers: "They'll take care of everything—local website, language translation, exchange rate, payment facilitation, etc. It's plug and play!" Not so fast. Before you get moving, there are a myriad of other essential pieces to consider: Will you be shipping physical products - if so, how and from where? Have we thought about customs duties, local product regulations, corporate tax implications, terms and conditions, and IP rights? Are there marketing and advertising restrictions in local countries? What data protection and security issues will we face? Join this session to delve into the many issues consumer-facing companies should address when seeking to expand globally.
In this article, explore three clusters building on the 1980 Organisation for Economic Co-operation and Development (OECD) Privacy Principles: protection and security, accountability, rights and responsibilities for using personal data. This document captures some of the key outcomes of the dialogue.
This articles shows how content theft sites and malware are exploited by cybercriminals to hack into internet users' computers and personal data in the United States.
The Canadian government issued this document to provide guidance to private sector organizations, both small and large, when a privacy breach occurs. Organizations should take preventative steps prior to a breach occurring by having reasonable policies and procedural safeguards in place, and conducting necessary training. This guideline is intended to help organizations take the appropriate steps in the event of a privacy breach and to provide guidance in assessing whether notification to affected individuals is required. Not all steps may be necessary, or some steps may be combined.
Lessons learned from devising programs to reduce products liability can point the way to creating effective information security policies.
This article explains and demystifies cybersecurity for senior management and directors by identifying the steps global companies must take to address, mitigate, and respond to the risks associated with data security.
This short article presents key issues companies in the US should consider regarding data breaches, wearables/employees Tracking, privacy, information security, human capital analytics, vendor management, mobile workforce (Bring Your Own Device), and the US Telephone Consumer Protection Act (TCPA),
This note provides a very brief description of user-friendly guidance provided by US federal agencies on compliance with data privacy laws.
Discuss provisions in cloud computing agreements that address sensitive issues, such as data ownership and protection, privacy and intellectual property. Obtain tips on negotiating liabilities and risks in cloud computing contracts — what provisions SaaS providers commonly include in agreements, provisions large customers typically request, which are negotiable and how to mitigate the impact of terms you cannot change.
Because financial industry databases are goldmines for hackers, the financial sector faces greater threats and higher regulatory demands and consequences than other industries. This interactive session will equip in-house counsel with the practical guidance and tools they need to respond when the inevitable happens. Attendees will work through a breach scenario and walk away from the program with a step-by-step outline of what to do when the data breach occurs (i.e., who to notify, remedial steps to take, etc.). Discuss best practices for information sharing, notification protocols and responding to the media. Explore the questions that should be considered before notifying the board and notifying the appropriate government agencies.