

Most of those that were aware of the terms assumed that these were issues being handled by IT, HR, or marketing departments. Page | 5 INTRODUCTION Five years ago few legal departments were concerned with – let alone focused on – data privacy or security. He represents clients from a variety of industries ranging from national department stores to international outsourcers.

He is the author of a leading handbook on data breach response – the Washington Legal Foundation’s Data Security Breaches: Incident Preparedness and Response – and the premier research handbooks on data privacy and security class action litigation. Zetoony has helped hundreds of clients respond to data security incidents, and has defended inquiries concerning the data security and privacy practices of corporations. 99 Page | 4 ABOUT THE AUTHOR David Zetoony is a partner at Bryan Cave LLP where he leads the firm’s international data privacy and security practice. Third Party Vendor Management Programs.92 59. Sharing Threat Indicators With The Government.89 57. Selecting a Qualified Security Assessor (“QSA”). Security Due Diligence In A Merger Or Acquisition.86 55. Negotiating Payment Processing Agreements. Healthcare Data Breach Enforcements and Fines.77 49. De-Identification, Anonymization, and Pseudonymization.69 44. Credit Cards and the Payment Card Industry Data Security Standard. Causes of Healthcare Data Breaches.55 34. Autonomous Vehicles – Cybersecurity Issues.49 32. Website Privacy Policies.47 Page | 3 DATA SECURITY.49 31. Social Security Number Privacy Policies.44 28. Responding To Third Party (Non-Government) Civil Subpoenas And Document Requests That Ask For Personal Information. Responding To National Security Letters That Ask For Personal Information.40 25. Responding To Government Subpoenas And Document Requests That Ask For Personal Information.38 24. Radio Frequency Identification (“RFID”).37 23. Privacy Due Diligence In A Merger Or Acquisition.36 22. Privacy Certifications and Trustbrands.35 21. Passing Data Between Retailers To Facilitate Transactions.33 20. Organizing Data Privacy Within A Company.32 19. FTC Tracking Of Privacy Complaints.26 15. Fingerprint Identification Technology.25 14. Companies Perceived By The FTC As Top Violators.11 5. Autonomous Vehicles – Data Privacy Issues.6 2. Page | 2 TABLE OF CONTENTS TABLE OF CONTENTS.
