What’s Unique About the California Consumer Privacy Act

The California Consumer Privacy Act of 2018 (“CCPA”) offers a new, very broad framework for data protection with increased obligations for businesses, and its reach is far and wide. It was passed in a whirlwind seven days. On the day it … Continue reading

Posted in California, Personal Information, Privacy, State Privacy Laws

Share this Article:

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Another day, and another form of hacking comes to light.  On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip “Defending Against Illicit Cryptocurrency Mining … Continue reading

Posted in Blockchain, Cryptocurrency, Cryptojacking, Cryptomining, Cyber Security, DHS, Malware, US-CERT

Share this Article:

Data Security Update: 11th Circuit Vacates FTC Order Against LabMD

Earlier this month, in a much anticipated decision, the 11th U.S. Circuit Court of Appeals vacated the Federal Trade Commission’s (FTC) cease and desist order against LabMD, Inc.  A summary of the relevant factual background and the FTC’s cease and … Continue reading

Posted in Cyber Security, Data Protection, FTC, Government Regulations

Share this Article:

Supreme Court: Warrant Usually Required For Cell Tower Records to Track a Person’s Movements

On June 22, 2018, the United States Supreme Court ruled in a 5-4 decision that the government generally needs a search warrant to track a person’s location through cell phone location records.  The opinion, in Carpenter v. United States was … Continue reading

Posted in Digital Devices, Digital evidence, Electronic devices, Government Regulations, Law Enforcement, Personal Information, Privacy

Share this Article:

Snell & Wilmer Rolls Out Interactive Data Breach Map

Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in coordination with third-party forensic experts; providing comprehensive crisis management … Continue reading

Posted in Data Breach

Share this Article:

Alabama’s Data Breach Law

All U.S states now have laws about data security and what to do when there’s a data breach. Alabama recently was the 50th state to add such a law, and it takes effect on June 1, 2018. Here are its … Continue reading

Posted in Data Breach, Government Regulations

Share this Article:

South Dakota’s New Breach Notification Law

On March 21, 2018, South Dakota became the 49th state to enact a breach notification law. The South Dakota law will take effect on July 1, 2018.  Here is a summary of several of the new legislation’s key features: Defining … Continue reading

Posted in Data Breach, Government Regulations, Notification, Personal Information, State Privacy Laws

Share this Article:

Celebrate National Tax Security Awareness Week!

While it may be better known as “Cyber Monday”, today also marks the start of the second annual National Tax Security Awareness Week (November 27 to December 1).  The Internal Revenue Service, state tax agencies and the tax industry are … Continue reading

Posted in Cyber Security, Identity Theft, IRS

Share this Article:

Business Email Compromise: What It Is and What You Can Do

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than $5.3 billion … Continue reading

Posted in Cyber scams, Cyber Security, Data Protection, FBI

Share this Article:

Happy Cybersecurity Awareness Month! Are you Safe?

October is National Cybersecurity Awareness month. To mark the occasion, the Arizona Society of Certified Public Accountants (www.ascpa.com) published this article in its monthly newsletter, written by a member of Snell & Wilmer’s Cybersecurity, Data Protection and Privacy practice. The … Continue reading

Posted in Cyber Security, Data Protection

Share this Article: