overview of helpful resources - Association of Corporate Counsel

OVERVIEW OF HELPFUL RESOURCES
Data Privacy Resources
•
•
National and International Organizations
o American Bar Association (ABA)
 Various privacy, data protection, and cybersecurity links,
http://apps.americanbar.org/dch/committee.cfm?com=PC802500
o Association of Corporate Counsel (ACC)
 Resources regarding compliance and data management, including
data privacy, http://www.acc.com/legalresources/ (membership
required to access resources)
o CERT Societe Generale
 https://cert.societegenerale.com/
 CERT Societe Generale Incident Response Methodologies,
https://cert.societegenerale.com/en/publications.html
o Compliance, Governance and Oversight Council (CGOC)
 https://www.cgoc.com/ (membership required to access resources)
 Privacy resources, https://www.cgoc.com/resources/privacyresources
o International Association of Privacy Professionals (IAPP)
 https://www.privacyassociation.org/ (membership required to
access resources)
 Close-Up: How to Build a Privacy Program,
https://www.privacyassociation.org/resource_center/close_up_how
_to_build_a_privacy_program
 Close-Up: Creating a Privacy Policy,
https://www.privacyassociation.org/resource_center/close_up_crea
ting_a_privacy_policy
o The Sedona Conference
 https://thesedonaconference.org/
 The Sedona Conference® International Principles on Discovery,
Disclosure & Data Protection (December 2011),
https://thesedonaconference.org/download-pub/495
 International privacy resources,
https://thesedonaconference.org/publications
United States (Federal and State)
o Department of Health and Human Services (DHHS)
 Health Information Privacy resources,
http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html
Copyright © 2014 Daley & Fey LLP. All rights reserved.
•
•
o Federal Trade Commission (FTC)
 Bureau of Consumer Protection Business Center,
http://www.business.ftc.gov/privacy-and-security/data-security
o State of California
 Department of Justice Office of the Attorney General,
http://oag.ca.gov/privacy
o U.S. Commodity Futures Trading Commission (CFTC)
 http://www.cftc.gov/consumerprotection/index.htm
 Gramm-Leach-Bliley Act Security Safeguards, CFTC Staff
Advisory No. 14-21, Feb. 26, 2014
http://www.cftc.gov/ucm/groups/public/@lrlettergeneral/document
s/letter/14-21.pdf
European Union
o European Commission
 Data Protection resources, http://ec.europa.eu/justice/dataprotection/index_en.htm
o European Union Agency for Network and Information Security
(ENISA)
 http://www.enisa.europa.eu/
United Kingdom
o Information Commissioner’s Office (ICO)
 http://ico.org.uk/for_organisations/data_protection
Information Security Resources
•
•
National and International Organizations
o International Organization for Standardization (ISO)
 http://www.iso.org/iso/home.htm
 ISO/IEC 27002:2013 Information Technology—Security
Techniques—Code of Practice for Information Security Controls,
http://www.iso27001security.com/html/27002.html
o The SANS Institute (SANS)
 http://www.sans.org/
 Information Security Policy Templates,
http://www.sans.org/security-resources/policies/
United States (Federal and State)
o HealthIT.gov
 http://healthit.gov/
o National Institute of Standards and Technology (NIST), U.S.
Department of Commerce
 http://www.nist.gov/
 Framework for Improving Critical Infrastructure Cybersecurity
(2014),
Copyright © 2014 Daley & Fey LLP. All rights reserved.
•
•
http://www.nist.gov/cyberframework/upload/cybersecurityframework-021214-final.pdf
 Guidelines for Managing Security of Mobile Devices in the
Enterprise (2013),
http://www.nist.gov/customcf/get_pdf.cfm?pub_id=913427
European Union
o ENISA
 Cyber Attack Readiness, https://www.enisa.europa.eu/media/keydocuments/infographics/enisa-and-european-cyber-securityexercises
 Information Security Awareness Materials,
http://www.enisa.europa.eu/media/multimedia/material
United Kingdom
o ICO
 A Practical Guide to IT Security,
https://ico.org.uk/Global/~/media/documents/library/Data_Protecti
on/Practical_application/it_security_practical_guide.ashx
o UK Department for Business Innovation & Skills
 10 Steps to Cyber Security,
http://www.bis.gov.uk/assets/biscore/business-sectors/docs/0-9/121121-10-steps-to-cyber-security-advice-sheets.pdf
Mobile Device Security Resources
•
•
National and International Organizations
o ABA
 Mobile Device Security (2014),
http://www.americanbar.org/content/dam/aba/administrative/litigat
ion/materials/2014_sac/2014_sac/mobile_device_security.authchec
kdam.pdf
 Protecting PHI on Mobile Devices (2013),
http://www.americanbar.org/publications/aba_health_esource/2013
-14/november/protecting_phi.html
o SANS
 Mobile Security Policy Templates, http://www.sans.org/securityresources/policies/mobile.php
United States (Federal and State)
o HealthIT.gov
 Mobile Device and Health Information Privacy and Security,
http://www.healthit.gov/providers-professionals/your-mobiledevice-and-health-information-privacy-and-security
Copyright © 2014 Daley & Fey LLP. All rights reserved.
Data Breach Resources
•
•
•
•
National and International Organizations
o ABA
 Introduction to Data Security Breach Preparedness with Model
Data Security Breach Preparedness Guide (2012),
http://www.americanbar.org/content/dam/aba/administrative/litigat
ion/materials/sac_2012/2215_intro_to_data_security_breach_preparedness.authcheckdam.pdf
o DRI
 Anatomy of Data Breaches: The Technology of How They Happen
and The Legal Response, http://www.dri.org/DRI/coursematerials/2011%20NFJE%20Symposium/pdfs/03-Whitman.pdf
o IAPP
 Close-Up: Responding to a Data Breach,
https://www.privacyassociation.org/resource_center/close_up_resp
onding_to_a_breach (membership required to access resources)
United States (State and Federal)
o FTC
 FTC Report: Protecting Consumer Privacy in an Era of Rapid
Change (2012),
http://www.ftc.gov/sites/default/files/documents/reports/federaltrade-commission-report-protecting-consumer-privacy-era-rapidchange-recommendations/120326privacyreport.pdf
 Taking Charge: What to Do if Your Identity Is Stolen,
http://www.consumer.ftc.gov/articles/pdf-0009-taking-charge.pdf
o DHHS
 Breach Notification Rule,
http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotific
ationrule/
European Union
o ENISA
 Data Breach Notifications,
http://www.enisa.europa.eu/activities/identity-and-trust/risks-anddata-breaches/dbn
United Kingdom
o ICO
 Guidance on Data Security Breach Management,
http://ico.org.uk/for_organisations/data_protection/~/media/docum
ents/library/Data_Protection/Practical_application/guidance_on_da
ta_security_breach_management.pdf
Copyright © 2014 Daley & Fey LLP. All rights reserved.
Cloud Computing Resources
•
•
National and International Organizations
o Cloud Security Alliance
 Security Guidance for Critical Areas of Focus in Cloud Computing
v3.0 (2011),
https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
o IAPP
 Close-Up: Cloud Computing,
https://www.privacyassociation.org/resource_center/close_up_clou
d_computing (membership required to access resources)
o NIST
 Cloud Computing Standards Roadmap (2013),
http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version2_2013_June18_FINAL.pdf
o PCI DSS
 PCI DSS Cloud Computing Guidelines (2013),
https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_Cloud_G
uidelines.pdf
United Kingdom
o ICO
 Guidance on the Use of Cloud Computing,
http://ico.org.uk/for_organisations/data_protection/topic_guides/on
line/cloud_computing
If you would like an electronic version of this document or if you have any
questions, please contact Laura Clark Fey at lfey@daleylegal.com
or 913.948.6301.
Copyright © 2014 Daley & Fey LLP. All rights reserved.