z
z
presented by Mark B. Manoukian
Securing Sensitive
Personal Data
z
1 Change our perspective
2 Improve our defenses
z
Data Is Valuable
z
Consequences of Data Breach
+ Money
+ Identity Theft
+ Ransom
+ Useful Secrets
+ Punishment
+ Damage to Reputation  Loss of Business
+ Civil Liability
+ Criminal Liability
z
Major Data Breaches of 2015
From http://www.zdnet.com/pictures/worst-largest-security-data-breaches-
2015/
+ Kapersky Labs
+ LastPass
+ CVS, Walgreen’s, Costco
+ Carhone Warehouse (UK)
+ UCLA Health
+ Hacking Team
+ Ashley Madison
+ Anthem
+ IRS
+ Office of Personnel
Management
z
How Did We Get Here?
z
Protecting Our Data in the Old Days
1. Communications were secure in that virtually all
communications were internal.
2. Data was secure in that it was stored on our servers in our
offices.
3. Access is restricted access by usernames and passwords?
4. You had full control over your PC, but it was
inconsequential.
5. Points of entry – desktop PCs in our office – were secure.
6. The only real threat was known viruses attached to e-mail.
7. Our firewall kept uninvited guests out.
8. We were low-value targets.
z
What Has Changed?
z
Communications
+ Employees are able to access our network remotely
across the public Internet.
+ We routinely use 3rd party services, typically web
sites, wherein we are communicating across the
public Internet.
z
Data
+ We store sensitive data of our clients.
+ Third parties store our sensitive data.
z
Points of Entry
+ Home PCs
+ Mobile Devices, Lots of Them
+ Public PCs  Devices
z
Viruses Have Evolved Into
Malware
+ Malware > Viruses.
+ Some malware is indefensible…
+ …in that it attacks flaws in the software that are unknown to
all, including the makers of the software.
+ …sometimes bespoke, just for you.
+ …it piggybacks on other, legit apps or web sites– e.g. Java,
Adobe Flash.
z
Usernames and Passwords
+ Public.
+ Broken.
+ Stolen.
+ Shared.
+ Reused.
z
Net Effect
1. Communications were secure in that virtually all
communications were internal.
2. Data was secure in that it was stored on our servers in our
offices.
3. Access is restricted access by usernames and passwords,
which may be easily broken.
4. You had full control over your PC, but it was
inconsequential.
5. Points of entry – desktop PCs in our office – were secure.
6. The only real threat was known viruses attached to e-mail.
7. Our firewall kept uninvited guests out.
8. We are a high-value low-value target.
z
Order of Events in Hack of RSA, Inc.
Recon
• Research public info about RSA employees
E-Mail
• Create e-mail accounts purporting to be a close friend or employee
Payload
• Payload is an indefensible piece of malware
Malware
• Malware leverages privileges to gain access
Damage
• Data is stolen
z
Recourse?
+ Yes, it’s illegal.
+ Remediation is difficult-to-impossible.
+ Prevention is the best strategy.
z
Action Items For…
+End Users – That’s You
+I.T. Staff
+Firm Management
+Technology Vendors
+Non-Technology Vendors
z
Action Item #1 for Employees:
Don’t let them in by e-mail.
+ Who is the e-mail actually from?
+ If you have to ask me if it is legit then you’ve already
told me that you don’t know this person.
+ Verify by an alternate method.
z
Spear Phishing
z
E-mail may
appear very
genuine
z
Address the
recipient
by name
Use lingo/
jargon of
company
Reference
actual
procedures,
SOPs/TTPs
z
z
Action Item #2: Look for “HTTPS”
Example of a Success
z
Action Item #2: Look for “HTTPS”
Example of a Failure
z
z
Test Yourself on #1 and #2
E-Mail Phishing Quiz:
http://www.sonicwall.com/phishing/
Web Site Phishing Quiz:
https://www.opendns.com/phishing-quiz/
z
Action Item #3: Maintain Your
Software
+ If you didn’t go looking for it then don’t install it.
+ If you installed it, then update it. The vast majority of
patches go to security.
+ If you don’t use it then uninstall it.
z
Action Item #4: Protect Your
Passwords
+ Don’t reuseshare passwords across high-value
accounts.
+ Keep them secure, in a password vault or paper in a
locked drawer in your desk.
+ Not in a Word or Excel document.
z
Action Item #5: Secure Your
Mobile Devices
+ Laptops
+ Smartphones
+ Tablets
+ Fitness gadgets
z
Action Item #6: This is a
mindset.
+ This is a marathon not a sprint.
+ There will be more action items.
+ For the rest of your life.
+ This is a perpetually, quickly moving target.
z
Recurring THEMES
Your PC + data are more valuable than you realize
Person using PC is the weakest link
Phishing is the most common attack vector
Test yourself!
z
Mark B. Manoukian
Director of Information Technology
Kegler Brown Hill + Ritter
mmanoukian@keglerbrown.com
keglerbrown.com/manoukian
614-462-5429
Thank You!
z
Litigation
THEORIES
in Data Breach Litigation
presented by Luis M. Alcalde
z
Why COMPANIES
Get Sued
z
Lost or stolen
computers containing
PII or SPI
z
Payment card
system hacking
z
Theft of financial
data hacking
z
Unknown intrusions
z
Publication of
personal information
z
Suits by banks against
corporate hacking
victim to recover cost
z
LEGAL PITFALLS
POTENTIAL
Was it preventable?
z
LEGAL PITFALLS
POTENTIAL
Was it preventable?Federal + 50 state disclosure requirements
z
LEGAL PITFALLS
POTENTIAL
Federal + 50 state disclose requirementsPublic reporting to SEC + federal/state agencies
z
Applicable U.S. Law
+ No common set of laws
governing civil liability
+ Claimants use patchwork
of federal and state
statutory claims +
common law claims
z
Federal Statutes
Health Insurance
Portability and
Accountability
Act (HIPPA)
Health Information
Technology for
Economic and
Clinical Health
Act (HITECH)
Stored
Communications
Act (SCA)
Fair Credit
Reporting
Act (FCRA)
Graham-Leach-Bliley
Act (GLBA)
z
State Law Claims
Consumer protection statutes
Unfair trade practices statutes
Negligence
Invasion of privacy
Breach of implied or express contract
Unjust enrichment
z
Standing + Injury Requirement
Need to establish injury in-fact to support Article III
standing in federal court (biggest impediment so far)
Concrete + particularized
Actual + imminent, not conjectural or hypothetical
Possible future injury not enough
Threatened injury must be impending
Plaintiffs often allege risk of future injury + expenses
to mitigate that risk
z
RISK of Future
Harm is Obstacle to
Consumer Cases
z
Lack of evidence of what
happened to the PII
Lack of evidence of financial
loss or proof of identity theft
Lack of loss because claimants
were reimbursed within
payment card system
Federal courts dismiss on mere
possibility of future harm
Plaintiff’s principal theory of
harm is risk that loss of PII puts
at higher risk of identity theft
Some district courts have found
standing on facts falling short
of actual financial harm
z
Mitigation
EXPENSES
Need to mitigate against
fraud + identity theft
Purchasing credit
monitoring services
Purchasing identity
theft insurance
z
re Sony Gaming Networks
…996 F. Supp 2d 942
(S.D. Cal. 2014)
April 2011: hackers attacked computer network
used to provide Sony PlayStation Network (PSN)
and related networks
z
re Sony Gaming Networks
…996 F.Supp 2d 942
(S.D. Cal. 2014)
Lawsuit claims that Sony did not adequately
protect networks and hackers were able to
access certain account holder information
z
re Sony Gaming Networks
…996 F.Supp 2d 942
(S.D. Cal. 2014)
Claims were that hackers stole information to
commit fraud and identity theft + account holders
were legally injured by the unavailability of the
network while temporarily off-line for 24 days
z
California D.C. court found
plaintiffs alleged sufficient
facts of “impending injury”
z
Alternative Theories of Harm
Lost time +
inconvenience
Emotional
distress
Decreased
economic
value of PII
Denied benefit
of the bargain
z
STATUTORY DAMAGES
z
STATE COURTS
EASIER?
z
Class Certification
HURDLE
z
AGAINST CLASS
CERTIFICATOIN
z
Suits by Banks + Financial Institutions
z
Luis M. Alcalde, Of Counsel
Kegler Brown Hill + Ritter
lalcalde@keglerbrown.com
keglerbrown.com/alcalde
614-462-5480
Thank You!
z
z
presented by Larry J. McClatchey
Understanding Secured Transactions +
Consignments
SECURING PAYMENT
z
Pre-pay or COD
Traditional Means
to Secure Payment
Letters of Credit
Guarantee
Liens in Seller’s Favor
z
Obstacles to Securing Payment
+ Type of Goods
+ Seller’s Existing Credit Terms + Conditions
+ Buyer’s Existing Credit Terms + Conditions
+ PO + Supply Agreements
z
UCC – Nationwide Rules for
Commerce
+ Rules for Sales + Leases
+ Banking, Checks + Letters of Credit
+ Procedures for Warehouse Receipts + Bills of Lading
+ Agreement to Grant Security to Seller
z
Not All Transactions +
Collateral Covered
Secured Transactions
Under Article 9
Classification of Collateral
z
Security Agreements
+ Identifies Parties
+ Buyer Grants Security Interest
+ Describes Collateral
+ Specific listing
+ Category of Goods
+ Type of Goods
+ Include Proceeds and Products of Collateral
+ Specifies Indebtedness to be Secured
z
Attachment of
Security Interests
+ Value given by creditor
+ Debtor has rights in collateral
+ Authenticated Security Agreement
1
Formal Requirements
z
Perfection of Security
Interest
+ Possession
+ Control
+ Perfection by Filing
2
z
Filing Rules
+ Name of Individual Debtor
+ Name of Registered Organization
+ Place of Filing
+ Changes in Name or Location
+ Sufficient description of Collateral
3
z
Basic Rules of Priority
+ First to File or Perfect
+ Filing Before Loan Closing
+ Lapse in Filing
4
z
The Purchase Money
Security Interest
A PMSI is distinguished from a standard security
interest in two main ways: its manner of creation
and the priority it receives relative to other
security interests in the same collateral.
z
Collateral Subject to PMSI:
+ Goods
+ Software
+ Consignor’s Inventory
The Purchase Money
Security Interest
z
The Purchase Money
Security Interest
Priority of PMSI:
+ Goods other than inventory
+ Inventory
z
The Purchase Money
Security Interest
“Superior Priority Status”:
+ Security Interest in Favor of Seller
+ Cost of Purchase of Collateral
z
The Purchase Money
Security Interest
Limitations on PMSI:
+ Notice of Conflicting Inventory
+ Prior Secured Party
z
Consignments
z
True Consignment Characteristics
+ Generally consumer goods
+ Value of goods less than $1000.
+ Delivered to merchant for sale
+ Merchant/auctioneer known to sell on consignment
+ Usually subject to state bailment law
z
UCC “Consignment”
Characteristics
+ Merchant deals with goods other than under
consignor’s name
+ Merchant is not an auctioneer
+ Not generally known as reseller
+ Aggregate value of goods over $1000
+ Inapplicable to consumer goods
+ Transaction does not create a security
interest to secure an obligation.
z
Common Commercial
“Consignment”
+ Security for payment of an obligation
+ Consignment of goods treated as PMSI in inventory
+ Rights between consignor and consignee unimpaired
+ Several practical problems with consignments
z
Priority of Consignor’s Claim
Dependent on Perfection
+ Priority over floating inventory lien
+ Must create and perfect as PMSI
+ Financing statement and notice
z
Practical Problems in Securing
Payment Under UCC
+ Transactional Costs
+ Change of Name of Debtor
+ Mergers/Successor Debtor
+ Remedies Upon Default
+ Disposition of Recovered Collateral
z
Issues to Consider
+ What Agreements in Effect Already?
+ Eligible for Statutory Lien?
+ Would PMSI Be Effective?
+ Do We Sell Type of Goods Suitable for Security
Agreement?
+ Practical Problems with Collateral?
z
Thank You!
Larry J. McClatchey, Director
Kegler Brown Hill + Ritter
lmcclatchey@keglerbrown.com
keglerbrown.com/mcclatchey
614-462-5463
z
Understanding +
DEFENDING
Preference Claims
presented by Christy A. Prince
z
What is a Preference?
Payment or transfer made during the
ninety days prior to bankruptcy
Debtor makes a payment or payments
to some creditors and not to others
90
z
Purpose of Preference Law?
Prevent “piecemeal” dismemberment of a debtor
Avoid the “race to the court house” among creditors
To promote equal distribution among creditors
similarly situated
z
Who Can Avoid a
Preferential Transfer?
1
Bankruptcy trustee or
“debtor in possession”
2
Representative of Liquidating
Trust in chapter 11 case
z
Elements of a
Preference Claim
Transfer of
property of
a debtor
To or for
benefit of
creditor
On account
of an
antecedent
debt
Made while
debtor was
insolvent
Enables creditor
to receive more
than if transfer
had not been
made
Within 90
days prior to
bankruptcy
z
Element: A Transfer
Must be of
the debtor’s
property
z
Element: A Transfer
Typically
from debtor
to creditor
z
Element: A Transfer
Could be
payment
from debtor
to third-
party
z
+ Debtor owes Creditor, and Creditor owes ABC Company
+ Debtor pays ABC Company for Creditor’s debt in
consideration of Debtor’s debt to Creditor
+ Debtor can recover the transfer from Creditor
z
+ Creditor applies credit for damaged goods to Debtor’s
account, reducing amount due from Debtor to Creditor
+ Application of credit to Debtor’s account is not a transfer
for the benefit of Creditor
+ Review records of alleged preferential transfers to weed
out credits
z
Element: Antecedent Debt
Transfer
must be on
account of
preexisting
debt
z
Element: Antecedent Debt
If payment
terms are
Cash on
Delivery, no
antecedent
debt
z
Element: Antecedent Debt
If payment
terms are
paying old
invoices, there
is antecedent
debt
z
Element: Time Span
If creditor is an
insider, preference
period is one year
prior to bankruptcy
petition date
z
Element: Time Span
If creditor is not an
insider, preference
period is 90 days
prior to bankruptcy
petition date
z
Element: Debtor’s Insolvency
Transfer must
have been
made while
debtor was
insolvent
z
Element: Debtor’s Insolvency
Insolvency is
presumed for
the 90 days
prior to
bankruptcy
z
Element: Debtor’s Insolvency
Creditor can
introduce
evidence that
debtor was
solvent at time
of transfer
z
Element: Debtor’s Insolvency
If bankruptcy
filed suddenly
after
meaningful
event, explore
this element
z
Element: Creditor Receives More
Disputes over this
element are rare
z
Element: Creditor Receives More
If debt fully secured
by collateral,
transfer didn’t allow
creditor to obtain
more than it would
have in bankruptcy
z
Element: Creditor Receives More
If creditors will be
paid in full through
bankruptcy, this
element would not
be met
z
Debtor/trustee must prove each
element of preference
Burden of proof for elements is
on debtor/trustee
Creditor can establish an
“affirmative defense”
Creditor has burden of proof on
any affirmative defense
Defense Considerations
z
Ordinary Course of
Business Defense
Encourages creditors to deal with companies on
“normal” credit terms
z
Ordinary Course of
Business Defense
The debt was incurred in the ordinary course of the business
between debtor and creditor, AND:
EITHER
Payment is made in the ordinary course of business
of the debtor and the transferee
OR
Payment is made according to
ordinary business terms in the industry
z
Ordinary Course of Business
Between the Parties
Payment that is “normal” in parties’
course of dealing
Consistency with other business
transactions between parties
Examines course of conduct + payment
history prior to filing
Historical period v. preference period
Consistency late payments may qualify
as ordinary payments
z
Payment NOT in Subjective
Ordinary Course of Business
Creditor requires a cashier’s check for the first time
Creditor imposes new terms during the preference period
Payment results from coercive collection practices
Creditor imposes or threatens credit hold
z
Ordinary Business Terms:
Objective Ordinary Course
Payment is “ordinary” in relation to
the relevant industry standard
Examine industry as a whole
Explore practices common to
similarly situated businesses
Usually requires expert testimony
z
Potential
PROBLEMS
with OCB
z
Subsequent New Value
Defense
Creditor may have replenished the value of Debtor
by continuing to supply goods/services
z
Subsequent New Value
Transfer by creditor after payment received
Not secured by “otherwise unavoidable” security interest
On account of which new value debtor did not make
an otherwise unavoidable transfer to or benefit of creditor
New value determined as of petition date,
so post-petition payments are not relevant
z
May not be available if
Creditor retains a
security interest
May not be available if
Debtor later paid for the
new goods prior to the
petition date
Subsequent New Value
z
+ June 1: Debtor pays Creditor $200,000
+ June 15: Creditor ships new goods on credit
+ August 1: Debtor files bankruptcy
+ Zero preference exposure because of SNV
+ Creditor has a proof of claim for $200,000
z
+ June 1: Debtor owes creditor $500,000
+ June 15: Debtor pays creditor $200,000
+ June 30: Creditor ships new goods ($100,000) on credit
+ August 1: Debtor files bankruptcy
+ $100,000 preference exposure because of SNV
+ Creditor has a proof of claim for $400,000
z
+ June 1: Creditor ships new goods ($200,000) on credit
+ June 15: Debtor pays creditor $200,000
+ August 1: Debtor files bankruptcy
+ $200,000 preference exposure
z
TIMING
of the Claim
z
Preparing for the
DEFENSE
z
Transfer <$5,000 in business cases<$5000
Amount in controversy
Case filed too late (statute of limitations)
Transfer to holder of unperfected lien rights
Other Potential Defenses
+
Transfer <$600 in consumer cases <$600
z
Where is the lawsuit filed?
When was the lawsuit filed?
How much is the claim?
Did the debtor make the transfer?
Checklist of Defenses
Against Preference Claims
z
Checklist of Defenses
Against Preference Claims
Do lien rights exist? PMSI?
Did debtor receive “20 day goods”?
Has debtor made “critical vendor” offer?
Section 503(b)(9) bargaining chip?
z
TIPS
Practical
z
Review your invoices
to compare to
industry standards
z
Stay consistent in
your collection
practices
z
If a problem customer
files bankruptcy,
work up defenses
while fresh
z
Preserve all records
of collection
communications
z
Don’t ignore a
demand letter
z
Christy A. Prince, Director
Kegler Brown Hill + Ritter
cprince@keglerbrown.com
keglerbrown.com/prince
614-462-5444
Thank You!
z

More Related Content

PPTX
Identity Theft and Data Compromise - TWCA Fall 2012
PDF
Ftc identity theft kit
PDF
Under Lock And Key
PPTX
Halvorsen on Risk Cyber Webinar
PPTX
CCIAOR Cyber Security Forum
PPTX
Social media competence and ethics Oklahoma
PDF
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
PDF
Massachusetts New Data Security Laws Presentation
Identity Theft and Data Compromise - TWCA Fall 2012
Ftc identity theft kit
Under Lock And Key
Halvorsen on Risk Cyber Webinar
CCIAOR Cyber Security Forum
Social media competence and ethics Oklahoma
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Massachusetts New Data Security Laws Presentation

What's hot (14)

PDF
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
PDF
Protecting the Information Infrastructure
PDF
Privacy Safe Guarding Sensitive PII Handbook 2013
PDF
Identity theft
PDF
TME0212-49
PDF
Cyber Liability Risk
PDF
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
PDF
Identity Theft : A Serious Crime
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PDF
Insider Threats Webinar Final_Tyco
PDF
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
PDF
Sept 2012 data security & cyber liability
PPTX
Cyber ID Sleuth Data Security Forensics
PPTX
The CPAs Guide to Buying Cyber Insurance
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Protecting the Information Infrastructure
Privacy Safe Guarding Sensitive PII Handbook 2013
Identity theft
TME0212-49
Cyber Liability Risk
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Identity Theft : A Serious Crime
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Insider Threats Webinar Final_Tyco
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Sept 2012 data security & cyber liability
Cyber ID Sleuth Data Security Forensics
The CPAs Guide to Buying Cyber Insurance
Ad

Viewers also liked (20)

PDF
Netiquette
PPT
A Picture Is Worth Thousand Words
PPTX
2014 villefranche
PPT
Пропозиція PR-агенції "Автограф"
PDF
Eyeblaster Research Note Cpc Curtail The Growth Display Advertising
PPT
18 Di Concetta
PPTX
2012 oslo-talk
PPT
TLC History
PPT
Autograf_comm_f
PPT
Persdev asr
PDF
Where to focus event innovation? - An audience led approach
PPTX
2013 ucdavis-smbe-eukaryotes
PPTX
2015 pycon-talk
PPS
وظائف القيادة
PDF
How to convert a file to Portable Document format (PDF)?
PDF
Cross-Border Transactions from a U.S. Perspective
PDF
Ejemplo completo de integración JLex y CUP
DOC
Breve Historia
PPT
RealTimeStudio
PPTX
Exporting to India: Strategies for Success
Netiquette
A Picture Is Worth Thousand Words
2014 villefranche
Пропозиція PR-агенції "Автограф"
Eyeblaster Research Note Cpc Curtail The Growth Display Advertising
18 Di Concetta
2012 oslo-talk
TLC History
Autograf_comm_f
Persdev asr
Where to focus event innovation? - An audience led approach
2013 ucdavis-smbe-eukaryotes
2015 pycon-talk
وظائف القيادة
How to convert a file to Portable Document format (PDF)?
Cross-Border Transactions from a U.S. Perspective
Ejemplo completo de integración JLex y CUP
Breve Historia
RealTimeStudio
Exporting to India: Strategies for Success
Ad

Similar to 2016 legal seminar for credit professionals (20)

PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PDF
IT Security Presentation - IIMC 2014 Conference
PPT
George Gavras 2010 Fowler Seminar
PDF
Why My E Identity Needs Protection
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
Clinton- Cyber IRT Balto 10_2012
PPTX
Using Technology and People to Improve your Threat Resistance and Cyber Security
PPTX
Cybersecurity Seminar March 2015
PPT
Rainer+3e Student Pp Ts Ch03
PPT
2.4.1 - Intro to Cyber Security for students.ppt
PPSX
State Data Breach Laws - A National Patchwork Quilt
PPTX
Cybersecurity & Computer Fraud - The Convergence
PPTX
2013 PMA Business Security Insights
PPT
Cyber Risks
PPT
Powerpoint mack jackson
PPTX
Cybercrime: A Primer
PPTX
Data Security for Nonprofits
PPTX
Kaseya Kaspersky Breaches
PDF
Effective Cyber Security: Successful Approaches and Experiences
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
IT Security Presentation - IIMC 2014 Conference
George Gavras 2010 Fowler Seminar
Why My E Identity Needs Protection
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Clinton- Cyber IRT Balto 10_2012
Using Technology and People to Improve your Threat Resistance and Cyber Security
Cybersecurity Seminar March 2015
Rainer+3e Student Pp Ts Ch03
2.4.1 - Intro to Cyber Security for students.ppt
State Data Breach Laws - A National Patchwork Quilt
Cybersecurity & Computer Fraud - The Convergence
2013 PMA Business Security Insights
Cyber Risks
Powerpoint mack jackson
Cybercrime: A Primer
Data Security for Nonprofits
Kaseya Kaspersky Breaches
Effective Cyber Security: Successful Approaches and Experiences

More from Kegler Brown Hill + Ritter (20)

PDF
2024 Managing Labor + Employee Relations Seminar
PDF
2023 Managing Labor + Employee Relations Seminar
PDF
Booming City Seminar.pdf
PDF
The Future of Work - A Pandemic Transformation of the Workplace.pdf
PDF
2022 Managing Labor + Employee Relations Seminar
PDF
2021 Managing Labor + Employee Relations Seminar
PDF
2020 LGBTQ SCOTUS Ruling
PDF
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...
PDF
Medical Marijuana Law in Ohio
PDF
Legalized Marijuana - Impact on Cities
PDF
The Impact of Legalized Marijuana
PDF
Medical Marijuana in the Ohio Workplace
PDF
Ohio's Medical Marijuana Business From a Legal Perspective
PDF
2020 Kegler Brown Labor Seminar
PDF
The Impact of Medical Marijuana in Ohio Workplaces
PDF
Grow + Sell Your Business Part Four: Employee Incentives
PDF
2019 Ethics Symposium
PPTX
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a Transaction
PPTX
2019 Employment Concerns in the Gig Economy
PPTX
Grow + Sell Your Business Part Two: IP Protections
2024 Managing Labor + Employee Relations Seminar
2023 Managing Labor + Employee Relations Seminar
Booming City Seminar.pdf
The Future of Work - A Pandemic Transformation of the Workplace.pdf
2022 Managing Labor + Employee Relations Seminar
2021 Managing Labor + Employee Relations Seminar
2020 LGBTQ SCOTUS Ruling
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...
Medical Marijuana Law in Ohio
Legalized Marijuana - Impact on Cities
The Impact of Legalized Marijuana
Medical Marijuana in the Ohio Workplace
Ohio's Medical Marijuana Business From a Legal Perspective
2020 Kegler Brown Labor Seminar
The Impact of Medical Marijuana in Ohio Workplaces
Grow + Sell Your Business Part Four: Employee Incentives
2019 Ethics Symposium
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a Transaction
2019 Employment Concerns in the Gig Economy
Grow + Sell Your Business Part Two: IP Protections

Recently uploaded (20)

PDF
UNIT- 13_Applied Ethics_Unethical Practices in Business .pdf
PDF
Insolvency and Bankruptcy Code (IBC) Overview and Company Management Insights...
PDF
UNIT- 12_Applied Ethics_Unethical Practices in Business.pdf
PPTX
7.Challenging Public Elections. lecture notes
PPTX
IT Act deals with the income head ,excemptions
PPTX
Constitution of India, A teacher's guide to the Constitution
PPT
Module Number 1 - VII Semester LLB Course - General Concepts
PPTX
The Balance of Power: Emergency Provisions in India
PPTX
Republic-Act-No.8485.ANIMAL WELFARE ACT IN THE PHILIPINES
PDF
Trade Union ACT NOTES for llb law students
PPTX
Introduction_to_ICT_in_Legal_Education.pptx
PPT
Federalism lecture note power point for law
PPTX
Preamble_Masterclass_PPT_with_Notes.pptx
PPTX
Law-On-Obligations-Presentation-One-1.pptx
PDF
INCORPORATION OF COMPANIES for company law
PPTX
ADR vs Mediation a detailed difference between them with cases
PDF
Private Notice of Disqualification and Notice of Violation for Disqualificati...
PPTX
Company Law Shares and Debentures, Members
PDF
Civil Court Procedure by Shivam Dhawal.pdf
PDF
Invalidation Case Study of Intragastric Device
UNIT- 13_Applied Ethics_Unethical Practices in Business .pdf
Insolvency and Bankruptcy Code (IBC) Overview and Company Management Insights...
UNIT- 12_Applied Ethics_Unethical Practices in Business.pdf
7.Challenging Public Elections. lecture notes
IT Act deals with the income head ,excemptions
Constitution of India, A teacher's guide to the Constitution
Module Number 1 - VII Semester LLB Course - General Concepts
The Balance of Power: Emergency Provisions in India
Republic-Act-No.8485.ANIMAL WELFARE ACT IN THE PHILIPINES
Trade Union ACT NOTES for llb law students
Introduction_to_ICT_in_Legal_Education.pptx
Federalism lecture note power point for law
Preamble_Masterclass_PPT_with_Notes.pptx
Law-On-Obligations-Presentation-One-1.pptx
INCORPORATION OF COMPANIES for company law
ADR vs Mediation a detailed difference between them with cases
Private Notice of Disqualification and Notice of Violation for Disqualificati...
Company Law Shares and Debentures, Members
Civil Court Procedure by Shivam Dhawal.pdf
Invalidation Case Study of Intragastric Device

2016 legal seminar for credit professionals

  • 1. z
  • 2. z presented by Mark B. Manoukian Securing Sensitive Personal Data
  • 3. z 1 Change our perspective 2 Improve our defenses
  • 5. z Consequences of Data Breach + Money + Identity Theft + Ransom + Useful Secrets + Punishment + Damage to Reputation Loss of Business + Civil Liability + Criminal Liability
  • 6. z Major Data Breaches of 2015 From http://www.zdnet.com/pictures/worst-largest-security-data-breaches- 2015/ + Kapersky Labs + LastPass + CVS, Walgreen’s, Costco + Carhone Warehouse (UK) + UCLA Health + Hacking Team + Ashley Madison + Anthem + IRS + Office of Personnel Management
  • 7. z How Did We Get Here?
  • 8. z Protecting Our Data in the Old Days 1. Communications were secure in that virtually all communications were internal. 2. Data was secure in that it was stored on our servers in our offices. 3. Access is restricted access by usernames and passwords? 4. You had full control over your PC, but it was inconsequential. 5. Points of entry – desktop PCs in our office – were secure. 6. The only real threat was known viruses attached to e-mail. 7. Our firewall kept uninvited guests out. 8. We were low-value targets.
  • 10. z Communications + Employees are able to access our network remotely across the public Internet. + We routinely use 3rd party services, typically web sites, wherein we are communicating across the public Internet.
  • 11. z Data + We store sensitive data of our clients. + Third parties store our sensitive data.
  • 12. z Points of Entry + Home PCs + Mobile Devices, Lots of Them + Public PCs Devices
  • 13. z Viruses Have Evolved Into Malware + Malware > Viruses. + Some malware is indefensible… + …in that it attacks flaws in the software that are unknown to all, including the makers of the software. + …sometimes bespoke, just for you. + …it piggybacks on other, legit apps or web sites– e.g. Java, Adobe Flash.
  • 14. z Usernames and Passwords + Public. + Broken. + Stolen. + Shared. + Reused.
  • 15. z Net Effect 1. Communications were secure in that virtually all communications were internal. 2. Data was secure in that it was stored on our servers in our offices. 3. Access is restricted access by usernames and passwords, which may be easily broken. 4. You had full control over your PC, but it was inconsequential. 5. Points of entry – desktop PCs in our office – were secure. 6. The only real threat was known viruses attached to e-mail. 7. Our firewall kept uninvited guests out. 8. We are a high-value low-value target.
  • 16. z Order of Events in Hack of RSA, Inc. Recon • Research public info about RSA employees E-Mail • Create e-mail accounts purporting to be a close friend or employee Payload • Payload is an indefensible piece of malware Malware • Malware leverages privileges to gain access Damage • Data is stolen
  • 17. z Recourse? + Yes, it’s illegal. + Remediation is difficult-to-impossible. + Prevention is the best strategy.
  • 18. z Action Items For… +End Users – That’s You +I.T. Staff +Firm Management +Technology Vendors +Non-Technology Vendors
  • 19. z Action Item #1 for Employees: Don’t let them in by e-mail. + Who is the e-mail actually from? + If you have to ask me if it is legit then you’ve already told me that you don’t know this person. + Verify by an alternate method.
  • 22. z Address the recipient by name Use lingo/ jargon of company Reference actual procedures, SOPs/TTPs
  • 23. z
  • 24. z Action Item #2: Look for “HTTPS” Example of a Success
  • 25. z Action Item #2: Look for “HTTPS” Example of a Failure
  • 26. z
  • 27. z Test Yourself on #1 and #2 E-Mail Phishing Quiz: http://www.sonicwall.com/phishing/ Web Site Phishing Quiz: https://www.opendns.com/phishing-quiz/
  • 28. z Action Item #3: Maintain Your Software + If you didn’t go looking for it then don’t install it. + If you installed it, then update it. The vast majority of patches go to security. + If you don’t use it then uninstall it.
  • 29. z Action Item #4: Protect Your Passwords + Don’t reuseshare passwords across high-value accounts. + Keep them secure, in a password vault or paper in a locked drawer in your desk. + Not in a Word or Excel document.
  • 30. z Action Item #5: Secure Your Mobile Devices + Laptops + Smartphones + Tablets + Fitness gadgets
  • 31. z Action Item #6: This is a mindset. + This is a marathon not a sprint. + There will be more action items. + For the rest of your life. + This is a perpetually, quickly moving target.
  • 32. z Recurring THEMES Your PC + data are more valuable than you realize Person using PC is the weakest link Phishing is the most common attack vector Test yourself!
  • 33. z Mark B. Manoukian Director of Information Technology Kegler Brown Hill + Ritter [email protected] keglerbrown.com/manoukian 614-462-5429 Thank You!
  • 34. z Litigation THEORIES in Data Breach Litigation presented by Luis M. Alcalde
  • 36. z Lost or stolen computers containing PII or SPI
  • 41. z Suits by banks against corporate hacking victim to recover cost
  • 43. z LEGAL PITFALLS POTENTIAL Was it preventable?Federal + 50 state disclosure requirements
  • 44. z LEGAL PITFALLS POTENTIAL Federal + 50 state disclose requirementsPublic reporting to SEC + federal/state agencies
  • 45. z Applicable U.S. Law + No common set of laws governing civil liability + Claimants use patchwork of federal and state statutory claims + common law claims
  • 46. z Federal Statutes Health Insurance Portability and Accountability Act (HIPPA) Health Information Technology for Economic and Clinical Health Act (HITECH) Stored Communications Act (SCA) Fair Credit Reporting Act (FCRA) Graham-Leach-Bliley Act (GLBA)
  • 47. z State Law Claims Consumer protection statutes Unfair trade practices statutes Negligence Invasion of privacy Breach of implied or express contract Unjust enrichment
  • 48. z Standing + Injury Requirement Need to establish injury in-fact to support Article III standing in federal court (biggest impediment so far) Concrete + particularized Actual + imminent, not conjectural or hypothetical Possible future injury not enough Threatened injury must be impending Plaintiffs often allege risk of future injury + expenses to mitigate that risk
  • 49. z RISK of Future Harm is Obstacle to Consumer Cases
  • 50. z Lack of evidence of what happened to the PII Lack of evidence of financial loss or proof of identity theft Lack of loss because claimants were reimbursed within payment card system Federal courts dismiss on mere possibility of future harm Plaintiff’s principal theory of harm is risk that loss of PII puts at higher risk of identity theft Some district courts have found standing on facts falling short of actual financial harm
  • 51. z Mitigation EXPENSES Need to mitigate against fraud + identity theft Purchasing credit monitoring services Purchasing identity theft insurance
  • 52. z re Sony Gaming Networks …996 F. Supp 2d 942 (S.D. Cal. 2014) April 2011: hackers attacked computer network used to provide Sony PlayStation Network (PSN) and related networks
  • 53. z re Sony Gaming Networks …996 F.Supp 2d 942 (S.D. Cal. 2014) Lawsuit claims that Sony did not adequately protect networks and hackers were able to access certain account holder information
  • 54. z re Sony Gaming Networks …996 F.Supp 2d 942 (S.D. Cal. 2014) Claims were that hackers stole information to commit fraud and identity theft + account holders were legally injured by the unavailability of the network while temporarily off-line for 24 days
  • 55. z California D.C. court found plaintiffs alleged sufficient facts of “impending injury”
  • 56. z Alternative Theories of Harm Lost time + inconvenience Emotional distress Decreased economic value of PII Denied benefit of the bargain
  • 61. z Suits by Banks + Financial Institutions
  • 62. z Luis M. Alcalde, Of Counsel Kegler Brown Hill + Ritter [email protected] keglerbrown.com/alcalde 614-462-5480 Thank You!
  • 63. z
  • 64. z presented by Larry J. McClatchey Understanding Secured Transactions + Consignments SECURING PAYMENT
  • 65. z Pre-pay or COD Traditional Means to Secure Payment Letters of Credit Guarantee Liens in Seller’s Favor
  • 66. z Obstacles to Securing Payment + Type of Goods + Seller’s Existing Credit Terms + Conditions + Buyer’s Existing Credit Terms + Conditions + PO + Supply Agreements
  • 67. z UCC – Nationwide Rules for Commerce + Rules for Sales + Leases + Banking, Checks + Letters of Credit + Procedures for Warehouse Receipts + Bills of Lading + Agreement to Grant Security to Seller
  • 68. z Not All Transactions + Collateral Covered Secured Transactions Under Article 9 Classification of Collateral
  • 69. z Security Agreements + Identifies Parties + Buyer Grants Security Interest + Describes Collateral + Specific listing + Category of Goods + Type of Goods + Include Proceeds and Products of Collateral + Specifies Indebtedness to be Secured
  • 70. z Attachment of Security Interests + Value given by creditor + Debtor has rights in collateral + Authenticated Security Agreement 1 Formal Requirements
  • 71. z Perfection of Security Interest + Possession + Control + Perfection by Filing 2
  • 72. z Filing Rules + Name of Individual Debtor + Name of Registered Organization + Place of Filing + Changes in Name or Location + Sufficient description of Collateral 3
  • 73. z Basic Rules of Priority + First to File or Perfect + Filing Before Loan Closing + Lapse in Filing 4
  • 74. z The Purchase Money Security Interest A PMSI is distinguished from a standard security interest in two main ways: its manner of creation and the priority it receives relative to other security interests in the same collateral.
  • 75. z Collateral Subject to PMSI: + Goods + Software + Consignor’s Inventory The Purchase Money Security Interest
  • 76. z The Purchase Money Security Interest Priority of PMSI: + Goods other than inventory + Inventory
  • 77. z The Purchase Money Security Interest “Superior Priority Status”: + Security Interest in Favor of Seller + Cost of Purchase of Collateral
  • 78. z The Purchase Money Security Interest Limitations on PMSI: + Notice of Conflicting Inventory + Prior Secured Party
  • 80. z True Consignment Characteristics + Generally consumer goods + Value of goods less than $1000. + Delivered to merchant for sale + Merchant/auctioneer known to sell on consignment + Usually subject to state bailment law
  • 81. z UCC “Consignment” Characteristics + Merchant deals with goods other than under consignor’s name + Merchant is not an auctioneer + Not generally known as reseller + Aggregate value of goods over $1000 + Inapplicable to consumer goods + Transaction does not create a security interest to secure an obligation.
  • 82. z Common Commercial “Consignment” + Security for payment of an obligation + Consignment of goods treated as PMSI in inventory + Rights between consignor and consignee unimpaired + Several practical problems with consignments
  • 83. z Priority of Consignor’s Claim Dependent on Perfection + Priority over floating inventory lien + Must create and perfect as PMSI + Financing statement and notice
  • 84. z Practical Problems in Securing Payment Under UCC + Transactional Costs + Change of Name of Debtor + Mergers/Successor Debtor + Remedies Upon Default + Disposition of Recovered Collateral
  • 85. z Issues to Consider + What Agreements in Effect Already? + Eligible for Statutory Lien? + Would PMSI Be Effective? + Do We Sell Type of Goods Suitable for Security Agreement? + Practical Problems with Collateral?
  • 86. z Thank You! Larry J. McClatchey, Director Kegler Brown Hill + Ritter [email protected] keglerbrown.com/mcclatchey 614-462-5463
  • 88. z What is a Preference? Payment or transfer made during the ninety days prior to bankruptcy Debtor makes a payment or payments to some creditors and not to others 90
  • 89. z Purpose of Preference Law? Prevent “piecemeal” dismemberment of a debtor Avoid the “race to the court house” among creditors To promote equal distribution among creditors similarly situated
  • 90. z Who Can Avoid a Preferential Transfer? 1 Bankruptcy trustee or “debtor in possession” 2 Representative of Liquidating Trust in chapter 11 case
  • 91. z Elements of a Preference Claim Transfer of property of a debtor To or for benefit of creditor On account of an antecedent debt Made while debtor was insolvent Enables creditor to receive more than if transfer had not been made Within 90 days prior to bankruptcy
  • 92. z Element: A Transfer Must be of the debtor’s property
  • 94. z Element: A Transfer Could be payment from debtor to third- party
  • 95. z + Debtor owes Creditor, and Creditor owes ABC Company + Debtor pays ABC Company for Creditor’s debt in consideration of Debtor’s debt to Creditor + Debtor can recover the transfer from Creditor
  • 96. z + Creditor applies credit for damaged goods to Debtor’s account, reducing amount due from Debtor to Creditor + Application of credit to Debtor’s account is not a transfer for the benefit of Creditor + Review records of alleged preferential transfers to weed out credits
  • 97. z Element: Antecedent Debt Transfer must be on account of preexisting debt
  • 98. z Element: Antecedent Debt If payment terms are Cash on Delivery, no antecedent debt
  • 99. z Element: Antecedent Debt If payment terms are paying old invoices, there is antecedent debt
  • 100. z Element: Time Span If creditor is an insider, preference period is one year prior to bankruptcy petition date
  • 101. z Element: Time Span If creditor is not an insider, preference period is 90 days prior to bankruptcy petition date
  • 102. z Element: Debtor’s Insolvency Transfer must have been made while debtor was insolvent
  • 103. z Element: Debtor’s Insolvency Insolvency is presumed for the 90 days prior to bankruptcy
  • 104. z Element: Debtor’s Insolvency Creditor can introduce evidence that debtor was solvent at time of transfer
  • 105. z Element: Debtor’s Insolvency If bankruptcy filed suddenly after meaningful event, explore this element
  • 106. z Element: Creditor Receives More Disputes over this element are rare
  • 107. z Element: Creditor Receives More If debt fully secured by collateral, transfer didn’t allow creditor to obtain more than it would have in bankruptcy
  • 108. z Element: Creditor Receives More If creditors will be paid in full through bankruptcy, this element would not be met
  • 109. z Debtor/trustee must prove each element of preference Burden of proof for elements is on debtor/trustee Creditor can establish an “affirmative defense” Creditor has burden of proof on any affirmative defense Defense Considerations
  • 110. z Ordinary Course of Business Defense Encourages creditors to deal with companies on “normal” credit terms
  • 111. z Ordinary Course of Business Defense The debt was incurred in the ordinary course of the business between debtor and creditor, AND: EITHER Payment is made in the ordinary course of business of the debtor and the transferee OR Payment is made according to ordinary business terms in the industry
  • 112. z Ordinary Course of Business Between the Parties Payment that is “normal” in parties’ course of dealing Consistency with other business transactions between parties Examines course of conduct + payment history prior to filing Historical period v. preference period Consistency late payments may qualify as ordinary payments
  • 113. z Payment NOT in Subjective Ordinary Course of Business Creditor requires a cashier’s check for the first time Creditor imposes new terms during the preference period Payment results from coercive collection practices Creditor imposes or threatens credit hold
  • 114. z Ordinary Business Terms: Objective Ordinary Course Payment is “ordinary” in relation to the relevant industry standard Examine industry as a whole Explore practices common to similarly situated businesses Usually requires expert testimony
  • 116. z Subsequent New Value Defense Creditor may have replenished the value of Debtor by continuing to supply goods/services
  • 117. z Subsequent New Value Transfer by creditor after payment received Not secured by “otherwise unavoidable” security interest On account of which new value debtor did not make an otherwise unavoidable transfer to or benefit of creditor New value determined as of petition date, so post-petition payments are not relevant
  • 118. z May not be available if Creditor retains a security interest May not be available if Debtor later paid for the new goods prior to the petition date Subsequent New Value
  • 119. z + June 1: Debtor pays Creditor $200,000 + June 15: Creditor ships new goods on credit + August 1: Debtor files bankruptcy + Zero preference exposure because of SNV + Creditor has a proof of claim for $200,000
  • 120. z + June 1: Debtor owes creditor $500,000 + June 15: Debtor pays creditor $200,000 + June 30: Creditor ships new goods ($100,000) on credit + August 1: Debtor files bankruptcy + $100,000 preference exposure because of SNV + Creditor has a proof of claim for $400,000
  • 121. z + June 1: Creditor ships new goods ($200,000) on credit + June 15: Debtor pays creditor $200,000 + August 1: Debtor files bankruptcy + $200,000 preference exposure
  • 124. z Transfer <$5,000 in business cases<$5000 Amount in controversy Case filed too late (statute of limitations) Transfer to holder of unperfected lien rights Other Potential Defenses + Transfer <$600 in consumer cases <$600
  • 125. z Where is the lawsuit filed? When was the lawsuit filed? How much is the claim? Did the debtor make the transfer? Checklist of Defenses Against Preference Claims
  • 126. z Checklist of Defenses Against Preference Claims Do lien rights exist? PMSI? Did debtor receive “20 day goods”? Has debtor made “critical vendor” offer? Section 503(b)(9) bargaining chip?
  • 128. z Review your invoices to compare to industry standards
  • 129. z Stay consistent in your collection practices
  • 130. z If a problem customer files bankruptcy, work up defenses while fresh
  • 131. z Preserve all records of collection communications
  • 133. z Christy A. Prince, Director Kegler Brown Hill + Ritter [email protected] keglerbrown.com/prince 614-462-5444 Thank You!
  • 134. z