10.07.2015 Views

1E9Ct5D

1E9Ct5D

1E9Ct5D

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5 for the RoadHackers Anonymous—Risk Mitigation Strategies forHandling Ever-Changing Threats to Data SecurityChristopher C. GenoveseNelson Mullins Riley & Scarborough, LLP, Columbia, South Carolinachris.genovese@nelsonmullins.comDavid G. HymerBradley Arant Boult Cummings, Birmingham, Alabamadhymer@babc.com1. Fully assess what paper and electronic data the company has a duty to protectand inventory what the company is currently doing to protect it.2. Implement relatively easy and inexpensive security measures. This includesencrypting all company hardware as a standard practice, redacting sensitiveinformation where possible, blocking off company systems from only those whoneed access, and using a 90 day password change cycle.3. Educate and update company employees. This includes developing and trainingemployees on meaningful company policies and procedures related to datamanagement and information security.4. Conduct meaningful audits of third party vendors (this includes outside counsel)as well as internal company systems.5. Prepare to respond to the inevitable data breach by developing a data breachresponse plan, confirming the company has adequate insurance coverage, andpreselecting an attorney experienced in data breach issues.March 6, 2015© 3-6-2015 ALFA International

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!