Alessandra Borelli
Partner
Prevention and suppression of unlawful acts: suggestions for legal measures in relation to the improper access of personal accounts, creation of fake profiles, unauthorized sharing of photos and videos, among others.
Extrajudicial Action:
Adoption of the main incident response measures:
1. Creation of the Incident Response Committee.
2. Documentation of all processes adopted to respond to the incident.
3. Identification of technical issues related to the incident.
4. Identification and delimitation of the type of data breach.
5. Verification of the need to communicate to the ANPD and affected data subjects, in case of exposure of personal data.
6. Communication to other regulatory bodies, authorities, and stakeholders.
7. Preparation of the communication book.
8. Notification to the personal data controller, if operator.
9. Activation of Cyber Insurance (if applicable) and subsequent regulation of the claim.
Administrative Action: request for granting authenticity seals.
Specialized criminal action: presentation of requests to initiate police investigations, monitoring of investigative procedures, promotion, conduction, and monitoring of criminal actions, etc.
Legal Action (civil, criminal, and labor):
Legal advice in incidents: treatment of the diversion of documents, data, and business information by employees and third parties in an unauthorized manner.
Legal monitoring of technical assistants and forensic experts: assistance in cases of cloning electronic equipment and preservation of the authenticity and integrity of the evidence.
Crisis management: legal support in the management of crises arising from security incidents, participation in crisis committees, performing a legal score of the severity of the incident, reviewing the communication strategy, acting before the competent authorities, and liaising with partners, suppliers, and data subjects impacted by the incident.
Structuring of Corporate Governance for Information Security: preparation and review of documents, such as the Code of Ethical Conduct, Information Security Policy, Policy for Home Office, Policy for Bring Your Own Device, Manual for Secure Online Meetings, Terms of Use, Employment Contract, and Contractual Clauses for contracts with suppliers, partners, and customers.
Technological Information Security Controls: legal analysis to assess legal risks related to employee privacy.
Data Loss Prevention Alert Management: evaluation of alerts produced by DLP systems in order to assess legal impacts, optimize system configurations, and give effectiveness to Information Security Policies;
Awareness: development and curation of content for educational and awareness purposes regarding Information Security, such as lectures, booklets, videos, knowledge pills, among others.