{"id":8886,"date":"2023-10-03T09:18:00","date_gmt":"2023-10-03T09:18:00","guid":{"rendered":"https:\/\/avvocato.vamtam.com\/?p=8886"},"modified":"2023-10-03T09:18:00","modified_gmt":"2023-10-03T09:18:00","slug":"will-the-secs-proposed-climate-risk-disclosure-rules-survive-supreme-court-scrutiny-3","status":"publish","type":"post","link":"https:\/\/alfacorporativolegal.com\/?p=8886","title":{"rendered":"Will the SEC&#8217;s proposed climate risk disclosure rules survive Supreme Court scrutiny?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8886\" class=\"elementor elementor-8886\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c6d01fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c6d01fd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-278d96d\" data-id=\"278d96d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67125318 elementor-widget elementor-widget-heading\" data-id=\"67125318\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Business lawyer Jayden Quinn speaks about how to prevent and manage the data security breaches that plague so many businesses. Tune in to the full podcast to learn how to protect yours.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cff14a7 elementor-widget elementor-widget-text-editor\" data-id=\"cff14a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As Forbes states, a business\u2019 second most valuable asset, next to its people, is its data. How are you protecting yours?<\/p><p><br \/>If you think you\u2019ll never have to worry about a data security breach, think again. It can happen whether you head up a large firm with an ironclad IT system or a small, local business.<\/p><p><br \/>Half of all businesses have already experienced a data security breach and cases continue to rise, yet most business leaders do not have an instant response plan in place. It\u2019s a dangerous risk to take, as a cyber security breach could shut down your operations and have a widespread impact on your employees, customers, board members, and anyone else who\u2019s on record of having interacted with your business.<\/p><p><br \/>The very thought might make you uneasy, though that\u2019s not necessarily a bad thing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22b25309 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22b25309\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e8b3c3\" data-id=\"8e8b3c3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b2a787e elementor-blockquote--skin-clean elementor-blockquote--align-center elementor-blockquote--button-view-icon elementor-blockquote--button-skin-link elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-blockquote--button-color-custom elementor-widget elementor-widget-blockquote\" data-id=\"3b2a787e\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\u201cIt means you\u2019re on your toes and you\u2019re aware of the problem,\u201d says Andrew Buck, business lawyer at Avvocato Law in Winnipeg.\u201d\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CIt+means+you%E2%80%99re+on+your+toes+and+you%E2%80%99re+aware+of+the+problem%2C%E2%80%9D+says+Andrew+Buck%2C+business+lawyer+at+Avvocato+Law+in+Winnipeg.%E2%80%9D&amp;url=https%3A%2F%2Falfacorporativolegal.com%2F%3Fp%3D8886\" class=\"elementor-blockquote__tweet-button\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-twitter\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Tweet<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-443fcbcc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"443fcbcc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35d833a7\" data-id=\"35d833a7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-293e4ea3 elementor-widget elementor-widget-heading\" data-id=\"293e4ea3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Inventory your data<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-303a7b6a elementor-widget elementor-widget-text-editor\" data-id=\"303a7b6a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Inventories aren\u2019t just for tangible goods. All businesses should inventory their data, too.<\/p><p>\u201cHow could you possibly understand the extent of the problem if you don\u2019t know what information you have in the first place?\u201d Andrew asks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27a86e8 elementor-widget elementor-widget-heading\" data-id=\"27a86e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Develop an incident response plan<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a35024b elementor-widget elementor-widget-text-editor\" data-id=\"1a35024b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>It could be a hacker that shuts down your computers or a disgruntled employee selling information to your competitors (fun fact: 22 per cent of breaches come from within a company), but if it happens\u2014you need to know what to do, and quickly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-385b0c7f elementor-widget elementor-widget-heading\" data-id=\"385b0c7f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Contain<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-326d7e38 elementor-widget elementor-widget-text-editor\" data-id=\"326d7e38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u201cYou need to shut off the tap,\u201d says Andrew.<\/p><p>That might mean reaching out to forensic experts or a systemwide reset, but your first job is stopping the flow of any more classified information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45f0d307 elementor-widget elementor-widget-heading\" data-id=\"45f0d307\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Mitigate<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-779ff93d elementor-widget elementor-widget-text-editor\" data-id=\"779ff93d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The mitigation phase is where you\u2019ll look at how you can reduce the harm to those who have been affected by the breach. For instance, if the breach involved a leak of financial information, it might mean offering free credit monitoring for a year or two.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4909d19e elementor-widget elementor-widget-heading\" data-id=\"4909d19e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Notify<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-787a1b2d elementor-widget elementor-widget-text-editor\" data-id=\"787a1b2d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In Canada, you\u2019re required to report privacy breaches or data security incidents that cross a certain threshold\u2014what is known in the legal world as real risk of significant harm. IT professionals, lawyers, and privacy regulators (find details at the Office of the Privacy Commissioner of Canada) can help you determine what that threshold is.<\/p><p>Canada\u2019s privacy law (the Personal Information Protection and Electronic Documents Act, or PIPEDA) specifies that a breach report should be made as soon as feasible, as in\u2014as soon as you get a grip on what happened. You can and should update your reporting as more details come in.<\/p><p>Andrew points to the case of Ashley Madison, a Canadian dating site for those who are married or coupled. It faced a significant security breach in 2015, with user data released to the public by hackers causing significant harm to individuals families and reputation. The Office of the Privacy Commissioner of Canada did a thorough investigation and its report, Andrew says, serves as an example of what is expected in terms of protecting privacy and data security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7cf99b2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7cf99b2a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e5d3bf4\" data-id=\"4e5d3bf4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-43168c23 elementor-widget elementor-widget-image\" data-id=\"43168c23\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" width=\"1024\" height=\"532\" src=\"https:\/\/alfacorporativolegal.com\/wp-content\/uploads\/2022\/12\/pexels-august-de-richelieu-4427810-1024x532.jpg\" class=\"attachment-large size-large wp-image-6987\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/alfacorporativolegal.com\/wp-content\/uploads\/2022\/12\/pexels-august-de-richelieu-4427810-1024x532.jpg 1024w, https:\/\/alfacorporativolegal.com\/wp-content\/uploads\/2022\/12\/pexels-august-de-richelieu-4427810-300x156.jpg 300w, https:\/\/alfacorporativolegal.com\/wp-content\/uploads\/2022\/12\/pexels-august-de-richelieu-4427810-768x399.jpg 768w, https:\/\/alfacorporativolegal.com\/wp-content\/uploads\/2022\/12\/pexels-august-de-richelieu-4427810-1536x798.jpg 1536w, https:\/\/alfacorporativolegal.com\/wp-content\/uploads\/2022\/12\/pexels-august-de-richelieu-4427810.jpg 1686w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73335f70 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73335f70\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6fe9de91\" data-id=\"6fe9de91\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22ac70f3 elementor-widget elementor-widget-heading\" data-id=\"22ac70f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Practice your incident response plan<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bd9914 elementor-widget elementor-widget-text-editor\" data-id=\"9bd9914\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Your incident response plan should not be a document that sits in a drawer and collects dust. Practice it, update it, and know it well, so you\u2019re ready to put it into action as soon as you need to.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f101f38 elementor-widget elementor-widget-heading\" data-id=\"6f101f38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Protect the data you\u2019re entrusted with<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f9a4c43 elementor-widget elementor-widget-text-editor\" data-id=\"2f9a4c43\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>If you\u2019re a board member, you may be privy to confidential company information. Andrew suggests seeking resources that provide guidance for boards, such as Canadian Securities Administrators (CSA), the Investment Industry Regulatory Organization of Canada (IIROC) and the Office of the Superintendent of Financial Institutions (OSFI).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c917c25 elementor-widget elementor-widget-heading\" data-id=\"3c917c25\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Understand the threats<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-121c7f6a elementor-widget elementor-widget-text-editor\" data-id=\"121c7f6a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Ransomware is software that essentially holds your data hostage until you pay a sum to retrieve it. Still, there\u2019s no guarantee paying that sum will get your data back.<\/p><p>The best thing you can do is to have a data backup and a disaster recovery system ready so you can bring your data back immediately. With ransomware attacks expected to increase by 100 per cent in 2022, it\u2019s important to know how to react should one happen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bbc2609 elementor-widget elementor-widget-heading\" data-id=\"3bbc2609\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6. Train staff<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f5eb2a8 elementor-widget elementor-widget-text-editor\" data-id=\"3f5eb2a8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Andrew tells of an email he received from a regular client that read, \u201cHere\u2019s the report you asked for.\u201d He hadn\u2019t requested a report, so he responded to see if the email was legit. The client assured him it was. Andrew then forwarded the email to his company\u2019s IT department and confirmed it was spam. Threats are becoming increasingly sophisticated. Andrew recommends training staff on how to identify threats, using different passwords for different applications, and picking up the phone if there\u2019s uncertainty over an email. Two-factor authentication can weed out threats like the one Andrew experienced.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Business lawyer Jayden Quinn speaks about how to prevent and manage the data security breaches that plague so many businesses. Tune in to the full podcast to learn how to protect yours. As Forbes states, a business\u2019 second most valuable asset, next to its people, is its data. How are you protecting yours? If you&#8230;<\/p>\n","protected":false},"author":1,"featured_media":8887,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[8,9],"class_list":["post-8886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-corporate-law","tag-corporate-law","tag-corsporate-law-news"],"_links":{"self":[{"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=\/wp\/v2\/posts\/8886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8886"}],"version-history":[{"count":0,"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=\/wp\/v2\/posts\/8886\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=\/wp\/v2\/media\/8887"}],"wp:attachment":[{"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacorporativolegal.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}