10.07.2015 Views

1E9Ct5D

1E9Ct5D

1E9Ct5D

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

loss of customer loyalty does the most damage to the bottom line.” 30III.Best Practices for Mitigating the Risk of a Data Breach.A. Technology is Your Friend.A business or law firm can take huge strides in data security by implementing basic andrelatively inexpensive security controls. Below are our top recommended securitycontrols to mitigate the risk of a data breach:1. Encryption, Encryption, Encryption!The importance of encryption cannot be overstated, and a company should encryptcompany hardware as a standard practice. Encryption scrambles data and the onlyway to unencrypt it is with a key. For full disc encryption, a name and password isneeded to access the data. Take the stolen laptop, misplaced flash drive, or companycomputers a disgruntled employee grabbed on his way out the door. If these devicesare encrypted, the exposure and risk related to protected information is dramaticallyreduced. As discussed below, encryption can in most states eliminate breachnotification requirements as well.2. Redact Sensitive Data.Software programs and technology exist to redact sensitive data out of traditionaldisplay formats. Appropriate redaction of sensitive information in displayed (rather than30 Id.March 6, 2015 15 © 3-6-2015 ALFA International Business Litigation P.G.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!