Data Privacy and Security Programs: Policies, Practices, Requirements, Latest Developments, Compliance Updates
Building, Maintaining, and Refining Programs to Meet the Ever-Changing Legal and Technology Landscape

Course Details
- smart_display Format
On-Demand
- signal_cellular_alt Difficulty Level
Intermediate
- work Practice Area
Cybersecurity and Data Privacy
- event Date
Tuesday, December 17, 2024
- schedule Time
1:00 p.m. ET./10:00 a.m. PT
- timer Program Length
90 minutes
-
This 90-minute webinar is eligible in most states for 1.5 CLE credits.
This CLE webinar will guide counsel through the legal considerations when advising clients on building, maintaining, and refining data privacy and security programs. The panel will discuss the latest developments and compliance updates and provide guidance on drafting and establishing policies and programs that address an organization's needs and will adapt and evolve with the ever-changing legal landscape and new and emerging technologies.
Faculty

Ms. Jacobson is a partner in the Data Privacy, Cybersecurity & Digital Assets Practice. She offers practical and tactical counsel on privacy and cybersecurity compliance strategies, data breach response, technology transactions and marketing initiatives for national and multinational organizations. Ms. Jacobson assists clients with the design and development of privacy-sensitive policies for the collection and use of personal data. She regularly advises businesses on the privacy and cybersecurity aspects of environmental, social and governance (ESG) programs, ethical data use, machine learning and artificial intelligence, vendor contracting and management and business sales, combinations and acquisitions.

Ms. Kiosse advises national and international companies on data privacy, artificial intelligence and other emerging technology, and corporate law matters. In the Data Privacy, Cybersecurity & Digital Assets Practice, she assists clients in developing and implementing a wide range of compliance policies, notices and assessments to meet legal and industry frameworks. Ms. Kiosse’s practice includes advising organizations on privacy issues associated with children’s data, cross-border data transfers, the complex data use and protection issues involved with emerging technology, and the changing US privacy and cybersecurity law landscape.
Description
Building an effective data privacy and security program requires a thorough analysis of the type of data an organization collects and how it uses and stores that data as well as who has access to it. Data security programs establish guidelines and safeguards to ensure that data is handled, stored, transmitted, and accessed in ways that meet an organization's needs while also ensuring compliance with applicable state, federal, and global privacy laws.
The key components of a data privacy program are the risk management strategies to protect against data breaches and protocols to anticipate and respond to security incidents effectively.
Once a privacy program is in place, continued maintenance, audits, and refinements are essential to maintain compliance with the ever-changing patchwork of laws as well as evolving threats and organizational needs.
Listen as our panel of privacy law experts provides tips and best practices for advising clients on building, maintaining, and refining data privacy and security programs.
Outline
- Overview: summary of laws governing data privacy and security programs
- Purpose of data privacy and security programs
- Key elements of an effective data privacy and security program
- Prioritizing different activities and deliverables when creating a privacy program to meet an organization's needs
- Building, maintaining, and refining programs to meet the ever-evolving legal and technical environments
- Preparing for possible data breaches
- Practitioner takeaways
Benefits
The panel will address these and other key considerations:
- What is the current legal framework requiring data privacy and security programs?
- What are the key elements of an effective data privacy program?
- What are important considerations for developing and maintaining data privacy programs that will meet the ever-evolving legal and regulatory framework as well as emerging technologies?
- How often should organizations review and update their data privacy and security programs and what is involved in the review process?
Related Courses

New DOJ Rule Restricting Cross-Border Data Transfers with China and Other Countries of Concern: Compliance Implications
Tuesday, February 25, 2025
1:00 p.m. ET./10:00 a.m. PT

AI and Data Privacy: Adapting Policies, Ensuring Responsible Use of Data, Mitigating Risks
Thursday, February 20, 2025
1:00 p.m. ET./10:00 a.m. PT
Recommended Resources
Explore the Advantages of Consistent Legal Language
- Business & Professional Skills
- Talent Development
- Learning & Development
The Power of Project Management: Using the 80/20 Rule in E-Discovery
- Legal Technology
- E-Discovery