WHO should be involved in revising or implementing a cybersecurity regime?
WHAT are the major threats to data, including individuals’ personally identifiable information (“PII”) and protected health information?
WHERE and how should one store employees’ PII and PHI?
WHY invest resources in building out cybersecurity policies and protocols?
WHEN should one develop and implement a data-breach incident-response plan?
I.The Big Picture – Data Breaches’ Prevalence; and Key Cyber Threats
II.U.S. and International Cybersecurity and Privacy Recent Legal Developments
III.Proactive Practical Protective Measures, including HR-Focused Ones
•Learn about the ever-expanding universe of data leakage concerns
•Learn the basics of some of the key pertinent rules of law
•Learn many practical steps – both proactive and reactive
Bob Brownstone, an attorney, technologist and thought leader, just wrapped up a long-term run as the Technology & eDiscovery Counsel and Electronic-Information-Management (EIM) Group Chair at Fenwick & West LLP, headquartered in Silicon-Valley. In May, he will launch his own law firm, tech consulting company and law/technology education provider. Bob will continue to advise and train clients on all things “e”, including eDiscovery, information-security, data-privacy, retentio... View Full Profile
This program has been approved for credit hours through the HR Certification Institute. For more information about certification or recertification, please visit the HR Certification Institute website at www.hrci.org.
Aurora Training Advantage is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org.