Key Learning Points
- Current escalation of data privacy laws and regulations
- History, evolution and future course of privacy regulations
- Complying with privacy laws and regulations
Level: ALL
This presentation will depict the current regulatory landscape of data privacy law and offer insights into how organizations can maintain corporate and regulatory compliance as these regulations rapidly evolve.
About Stephen Treglia
Stephen Treglia concluded a 30-year career as a prosecutor in New York, having created and supervised one of the world’s first computer crime units from 1997-2010. For 10 years prior he supervised numerous organized crime investigations in the New York City metropolitan area. Stephen’s areas of expertise relate to technology such as search and seizure of digital evidence, computer forensics performed in a legally admissible manner and the general admissibility of computer-generated evidence. For the last 10 years, he has routinely assisted in training computer forensic examiners with the FBI’s Computer Analysis Response Team.
As Absolute’s Legal Counsel for Investigations, Stephen oversees a staff of 38 ex-law enforcement officers and Investigative Analysts with more than 900 years of collective former law enforcement experience to ensure they conduct their investigations in a legally compliant manner. To date, the Investigations staff has recovered over 35,000 stolen mobile devices in 112 countries. To accomplish this, they have developed relationships with over 7500 current law enforcement agencies worldwide.
Beginning in January, 2013, Stephen became HIPAA Privacy Officer of the Investigations Section to make sure the staff remains compliant with current healthcare statutes and regulations. In 2015, he became certified as a Healthcare Information Security and Privacy Professional by the International Information Systems Security Certification Consortium (ISC)2, often called the “world’s largest IT certification organization.” He is recognized as a nationwide authority and lecturer on data security and has regularly contributed articles to the Technology Today column of the New York Law Journal since 2002.
Follow Stephen on Twitter