The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer. All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. This policy is subject to change at any time. The owner is not an attorney, and nothing posted on this site should be construed as legal advice. Litigation Support Tip of the Night does not provide confirmation that any e-discovery technique or conduct is compliant with legal, regulatory, contractual or ethical requirements.
New tips for paralegals and litigation support profesionals are posted to this site each week. Click on the blog headings for better detail.
Avenir Light is a clean and stylish font favored by designers. It's easy on the eyes and a great go to font for titles, paragraphs & more.
Oct 26, 2020
State Laws Require Businesses to Will o' WISP
In 2018, Michigan enacted its Data Security Act which applies to persons and entities with licenses from its Department of Insurance and Financial Services.
In order to comply with the act it is necessary to :
1. Prepare a Written Information Security Program (WISP).
2. File a certificate of compliance with the Department each year.
3. Report breaches to the Department within 10 days after discovery.
Massachusetts also has cybersecurity regulations which require that a WISP be filed. A template of a WISP that complies with Massachusetts law and the Gramm-Leach-Bliley Act has been prepared by Thomson Reuters and is available here on the website of the International Association of Privacy Professionals (IAPP). A WISP should cover the following:
1. Define personal information and sensitive information.
2. Designate a person responsible for implementing the WISP.
3. Provide for regular risk assessments.
4. Direct the distribution of information security policies within the organization.
5. Monitor service providers to ensure they comply with WISP.