Jim Koenig (@koenigprivacy) 's Twitter Profile
Jim Koenig

@koenigprivacy

Jim globally Co-Leads the Privacy & Cyber Practice at Troutman Pepper. Jim provides integrated solutions blending business, legal and technical perspectives.

ID: 1709175206

linkhttp://www.linkedin.com/in/jimkoenig calendar_today29-08-2013 05:14:10

51 Tweet

93 Takipçi

0 Takip Edilen

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

Essential COVID-19 health information collection, disclosure and work-at-home strategies - emerging trends and best practices based on global regulatory guidance. Learn more in this Alert (ow.ly/qsVi50yTJRk) and register for this webinar tomorrow/W…lnkd.in/gMcfjSH

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

Big News... I moved to AmLaw powerhouse #troutmanpepper to co-lead its #privacy & #cybersecurity practice and build a unique team of legal and industry lawyers, security and data experts to extend the services traditionally offered by a law firm. troutman.com/insights/inter…

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A5: It's in part about business at the end of the day. Apple made a business decision to implement strong #encryption #AppleFBIChat (2/4)

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A5: I support #tech co's that make business decisions to use #encryption to promote trust & responsible/lawful uses #AppleFBIChat (3/4)

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A5: Demand for end-to-end encryption will enable more secure & private use of comms devices, including bad actors #AppleFBIChat (4/4)

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A6: In a connected world, the attack surface for cyber threats and bad actors grows as more things become connected #IoT #AppleFBIChat (1/4)

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A6: 69% Americans surveyed concerned re: #dataprivacy & believe they should own #data generated from personal #iot devices #AppleFBIChat 1/3

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A6:Safety concern: If workaround required, couldn’t Apple engineers later be hired by competitors, terrorists or bad actors? #AppleFBIChat

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A6: You do not get a tech “do overs.” You can’t un-know solution that created master keys… #AppleFBIChat #encryption (4/4)

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

A8: .#tech needs to be an ally to gvmt, and gvmt needs to respect business autonomy in search for balanced solution #AppleFBIChat (3/3)

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

Join me today ET for a BCLT/PH webinar on the 5 steps to take to certify under Privacy Shield b4 9/30. Register bit.ly/2aUB7Q0

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

Avoid 2 areas of confusion on Privacy Shield: Certify by 9/30/16 & Maintain Swiss Safe Harbor certs. #PrivacyShield bit.ly/2blEntX

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

Big News!! I joined tech all-star Fenwick & West to Co-Chair the Privacy/Cyber Practice. Unique One-Stop Shop... goo.gl/GW9raA

Jim Koenig (@koenigprivacy) 's Twitter Profile Photo

Giving TEDx Talk @ 4 pm today - Convenient or creepy? Navigating privacy to realize the promise of connected cars. goo.gl/MGFwb8