| Fourteenth Annual Institute on Privacy and Data Security Law 2013 Table of Contents, Vol. 1 |
|
|
| Fourteenth Annual Institute on Privacy and Data Security Law 2013 Table of Contents, Vol. 2 |
|
|
| Chapter 1: U.S. State and Selected Federal Privacy and Data Security Developments 2012–13 (June 17, 2013); And Exhibits A-C |
John B. Kennedy ~ Wiggin and Dana LLP
|
|
| Chapter 2: Privacy & Security Law Report: Mobile Payments: The Challenge of Protecting Consumers and Innovation (February 7, 2011) |
Chris Hoofnagle ~ UC Berkeley Law
|
|
| Chapter 3: Privacy and Information Security Law Blog: Global Privacy and Cybersecurity Law Updates and Analysis—Update: Mobile Privacy (February 1, 2013) |
Lisa J. Sotto ~ Hunton & Williams LLP
|
|
| Chapter 4: Location-Based Services: Time for a Privacy Check-In |
Chris Conley ~ ACLU of Northern California
Nicole A. Ozer ~ ACLU of Northern California
|
|
| Chapter 5: Bloomberg BNA: Privacy and Security Law Report: Final HIPAA Omnibus Rule Brings Sweeping Changes to Health Care Privacy Law: HIPAA Privacy and Security Obligations Extended to Business Associates and Subcontractors (February 4, 2013) |
Reece Hirsch ~ Morgan Lewis & Bockius LLP
|
|
| Chapter 6: Bloomberg BNA: Privacy and Security Law Report: What Every General Counsel Should Know About Privacy and Security: 10 Trends for 2013 (January 28, 2013) |
Reece Hirsch ~ Morgan Lewis & Bockius LLP
|
|
| Chapter 7: Lawyers and Data Security: 2013 Update—Understanding a Lawyer’s Ethical and Legal Obligations That Arise from Handling Client Information (June 19-20, 2013) |
Matthew H. Meade ~ Buchanan Ingersoll & Rooney PC
|
|
| Chapter 8: The New HITECH/HIPAA Era |
Kirk J. Nahra ~ Wiley Rein LLP
|
|
| Chapter 9: Data Security Requirements for Non-Regulated Business Sectors |
Thomas J. Smedinghoff ~ Edwards Wildman Palmer LLP
|
|
| Chapter 10: Data Breach Outline |
Paul H. Luehr ~ Stroz Friedberg
Linda Clark ~ Reed Elsevier Group
|
|
| Chapter 11: Data Breach Response Checklist |
Paul H. Luehr ~ Stroz Friedberg
Linda Clark ~ Reed Elsevier Group
|
|
| Chapter 12: U.S. Securities and Exchange Commission: CF Disclosure Guidance: Topic No. 2— Cybersecurity (October 13, 2011) |
Paul H. Luehr ~ Stroz Friedberg
Linda Clark ~ Reed Elsevier Group
|
|
| Chapter 13: New York Department of State, Division of Consumer Protection: Sample Letter From a Breaching Entity to Notify New Yorkers of a Security Breach Incident |
Paul H. Luehr ~ Stroz Friedberg
Linda Clark ~ Reed Elsevier Group
|
|
| Chapter 14: Designing a Global Privacy Program: Policies and Procedures for Responding to Government Requests for Access to Data and Communications (March 2013) |
Francoise Gilbert ~ IT Law Group
|
|
| Chapter 15: CPO’s Guide to Developing and Maintaining a Global Privacy Program (March 7, 2013) |
Harriet Pearson ~ Hogan Lovells US LLP
|
|
| Chapter 16: Responding to a Global Data Breach (May 2013) |
Lara Kehoe Hoffman ~ Autodesk, Inc.
Cathy Bump ~ Expedia, Inc.
Paola Zeni ~ Symantec Corporation
|
|
| Chapter 17: Global Employee Privacy and Data Security Law (2011) |
Christine E. Lyon ~ Morrison & Foerster LLP
Miriam H. Wugmeister ~ Morrison & Foerster LLP
|
|
| Chapter 18: Securing Information Assets in an Insecure World: Practical Steps Every Business Should Take to Protect Itself Legally From Global Cybersecurity Threats (March 19, 2013) |
Michael Stoker ~ Baker & McKenzie LLP
Brian Hengesbaugh ~ Baker & McKenzie LLP
|
|
| Chapter 19: Field Guide to Direct Marketing and Privacy Law Compliance (February 25, 2013) |
Lothar Determann ~ Baker & McKenzie LLP
|
|
| Chapter 20: The Privacy Advisor: IAPP—Check: Are You Ready for Social Media? (June 2012) |
Lothar Determann ~ Baker & McKenzie LLP
|
|
| Chapter 21: Social Media Policies for Global Employers |
Lothar Determann ~ Baker & McKenzie LLP
Ute Krudewagen ~ Baker & McKenzie LLP
|
|
| Chapter 22: Bloomberg BNA: Privacy and Security Law Report: Social Media @ Work—A Checklist for Global Businesses (March 19, 2012) |
Lothar Determann ~ Baker & McKenzie LLP
|
|
| Chapter 23: Stanford Technology Law Review: Social Media Privacy: A Dozen Myths and Facts (2012) |
Lothar Determann ~ Baker & McKenzie LLP
|
|
| Chapter 24: Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed in the United States |
Lothar Determann ~ Baker & McKenzie LLP
Robert Sprague ~ Baker & McKenzie LLP
|
|
| Chapter 25: The Privacy Advisor: IAPP—Employee Monitoring Technologies and Data Privacy—No One-Size-Fits-All Globally (May 2009) |
Lothar Determann ~ Baker & McKenzie LLP
|
|
| Chapter 26: Employee Privacy Rights 2013 |
Margaret A. Keane ~ Littler Mendelson P.C.
|
|
| Chapter 27: Global Guide to Whistleblowing Programs 2012 |
Mark E. Schreiber ~ Edwards Wildman Palmer LLP
|
|
| Chapter 28: Negotiating Privacy and Security Contract Terms |
Sarvesh Mahajan ~ Wiggin and Dana, LLP
Hilary Goodier ~ Infosys Limited
|
|
| Chapter 29: At the Intersection of Cloud Computing, Privacy and Data Protection: Stop, Go or Proceed with Caution? (March 19, 2013) |
Rebecca S. Eisner ~ Mayer Brown LLP
|
|
| Chapter 30: Straight Talk from Privacy and Security Regulators: Trends and Targets for 2013 and Beyond |
Alexandra Ross ~ Paragon Legal at Autodesk, Inc.
|
|
| Chapter 31: Privacy and Data Security: Regulation and Enforcement |
Shannon Smith ~ Washington Attorney General’s Office
|
|
| Chapter 32: Privacy Policies & a Checklist for Drafting a Privacy Statement (2013) |
Ian C. Ballon ~ Greenberg Traurig, LLP
|
|
| Chapter 33: Data Privacy Class Action Litigation (2013) |
Ian C. Ballon ~ Greenberg Traurig, LLP
|
|
| Chapter 34: State Security Breach Statutes: A Practical Approach (2013) |
Ian C. Ballon ~ Greenberg Traurig, LLP
|
|
| Chapter 35: Subpoenas for Internet, Cloud and Social Media Evidence (2013) |
Ian C. Ballon ~ Greenberg Traurig, LLP
|
|
| Chapter 36: Checklists for Requests from Third Parties for Information |
James G. Snell ~ Bingham McCutchen LLP
|
|
| Chapter 37: The Digital Marketing Ecosystem: Trends, Risks and Obligations (2013) |
Nicholas Gadacz ~ Marin Software Incorporated
|
|
| Chapter 38: Electronic Frontier Foundation “Deeplink” Blog Posts: Digital Marketing Ecosystem (March 2011–March 2013) |
Lee Tien ~ Electronic Frontier Foundation
|
|
| Chapter 39: U.S. Senate Committee on Commerce, Science & Transportation—Hearing: “The Need for Privacy Protections: Is Industry Self-Regulation Adequate?” Testimony of Peter Swire, C. William O’Neill Professor of Law, Moritz College of Law, OSU (June 28, 2012) |
Lee Tien ~ Electronic Frontier Foundation
|
|
| Chapter 40: Privacy and Information Security Law Blog: Global Privacy and Cybersecurity Law Updates and Analysis—Update: Social Media (January 25, 2013) |
Teena H. Lee ~ Estee Lauder Companies, Inc.
Aaron P. Simpson ~ Hunton & Williams LLP
|
|
| Chapter 41: Privacy and Information Security Law Blog: Global Privacy and Cybersecurity Law Updates and Analysis—Update: Behavioral Advertising (December 19, 2012) |
Teena H. Lee ~ Estee Lauder Companies, Inc.
Aaron P. Simpson ~ Hunton & Williams LLP
|
|
| Chapter 42: Privacy and Information Security Law Blog: Global Privacy and Cybersecurity Law Updates and Analysis—Update: Coppa (December 19, 2012) |
Teena H. Lee ~ Estee Lauder Companies, Inc.
Aaron P. Simpson ~ Hunton & Williams LLP
|
|
| Chapter 43: Privacy and Information Security Law Blog: Global Privacy and Cybersecurity Law Updates and Analysis—Update: FTC Privacy Report (March 27, 2012) |
Teena H. Lee ~ Estee Lauder Companies, Inc.
Aaron P. Simpson ~ Hunton & Williams LLP
|
|
| Chapter 44: The Digital Marketing Ecosystem: Trends, Risks and Obligations (March 7, 2013) |
Jerry Cerasale ~ Direct Marketing Association
|
|
| Chapter 45: Direct Marketing Association’s Guidelines for Ethical Business Practice (May 2011) |
Jerry Cerasale ~ Direct Marketing Association
|
|
| Chapter 46: Self-Regulatory Principles for Online Behavioral Advertising (July 2009) |
Jerry Cerasale ~ Direct Marketing Association
|
|
| Chapter 47: Self-Regulatory Principles for Multi-Site Data (November 2011) |
Jerry Cerasale ~ Direct Marketing Association
|
|
| Chapter 48: Ethics and Risk Management for Privacy Lawyers (May 21, 2013) |
Merri A. Baldwin ~ Rogers Joseph O’Donnell, P.C.
Kathryn J. Fritz ~ Fenwick & West LLP
|
|
| Chapter 49: Privacy and Security Ethics for Lawyers (June 17, 2013) |
Alfred J. Saikali ~ Shook, Hardy & Bacon LLP
|
|
| Chapter 50: Negotiating Data Security and Privacy Terms in Cloud Contracts Quiz (Powerpoint Slides) |
Corey M. Miller ~ Microsoft Corporation
Rudy Guyon ~ McAfee, Inc
|
|
| Chapter 51: Responding to Third Party Requests for Personal Data (Powerpoint Slides) |
Alan Charles Raul ~ Sidley Austin LLP
JoAnn Stonier ~ MasterCard Worldwide
|
|
| Index to Fourteenth Annual Institute on Privacy and Data Security Law 2013, Vol. 1 |
|
|
| Index to Fourteenth Annual Institute on Privacy and Data Security Law 2013, Vol. 2 |
|
|