Cyber security, data loss, hacking and schemes to steal personal information and assets electronically are all over the news daily. Companies are the primary targets of these actions since they accumulate information, store it and use it for their internal efforts, for their clients and in interacting with the world outside. In an effort to prevent problems before they arise, and to be in the best possible posture should their company become a victim of these damaging events, below is a list of questions that general counsel, senior management and corporate directors should be asking of themselves and their companies:
- Why should my company be concerned?
- Who would want to target us?
- Is the problem likely to come from within or outside the company?
- What components of the company are tied directly to computer networks?
- What company records are accessible by network?
- Can someone explain to me in layperson language how we are protected?
- Who is ultimately responsible for the integrity of our system/data?
- How can I be assured that our security is up to date?
- Do we need a Chief Privacy Officer?
- How do we control the authorization of access?
- Is the level of access commensurate with the job responsibilities?
- How do we withdraw access?
- What alarms/indicators does our network have to show unauthorized access?
- What’s the plan for an interruption of service?
- Do we have a secure backup system/offsite data vault/redundant servers and how long until we are up and running “cleanly” after a serious breach?
- How do we prevent authorized users from exploiting the data to which they have access?
- Does the company have adequate internal controls to detect employee abuses?
- Are we vulnerable to worms/viruses or whatever from our own employees bringing software onto our system/network?
- Are we encouraging employees to share their concerns about vulnerabilities?
- Have our independent auditors approved our internal controls for cybersecurity?
- Can we test our systems before there’s a problem?
- Have we retained a qualified company to send “Tiger Teams” against our systems/network to try to hack it and exploit its weaknesses?
- Do we have a rapid response plan?
- Are there companies we can retain who will not only help protect our network, but also help us recover from an attack or successful infiltration?
- Do we have a secure backup system/offsite data vault/redundant servers and how long until we are up and running “cleanly” after a serious breach?
- How expensive could a data breach be?
- Are we adequately insured?
- Has the company sufficiently disclosed to investors the risks of a data breach?
- What laws govern our duties to disclose a data breach?
- How much and when must we disclose?
- What are all the risks of disclosure of an event, whether required by law or not?
- What are the litigation risks to management, the Board, shareholders and the company of a successful hack, data theft and/or system failure?
- Can state or federal investigators help us?
- Are we waiving any legal protections/privileges by disclosing or working with government entities?
- How do we preserve those legal protections/privileges and still do what we need to do?
- What can outside counsel offer the company?
Sheppard Mullin has significant experience in dealing with cybersecurity and privacy issues, both from a legal standpoint and from a data processing/technical standpoint. In addition, Sheppard Mullin has been identifying and working with experts whose job it is to prevent these events, others who help deal with these events when they occur and their aftermath, relevant experienced prosecutors and even insurance professionals who have products covering these kinds of losses.
For further information, please contact Bob Rose at (619) 338-6661 or David Geneson at (202) 218-0030.
real estate attorney real estate lawyer solicitor solicitors statute law
No comments:
Post a Comment