Taxpayer Cybersecurity – Step 5: Create a Data Theft Recovery Plan

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to assess their data security policies and review critical … Continue reading

Posted in Cyber scams, Cyber Security, Data Breach, Data Protection, Identity Theft, IRS, Personal Information

Share this Article:

Taxpayer Cybersecurity – Step 4: Recognize Identity Theft

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to assess their data security policies and review critical … Continue reading

Posted in Cyber Security, Data Breach, Data Protection, E-mail phishing, Identity Theft, IRS, Notification, Personal Information

Share this Article:

Taxpayer Cybersecurity – Step 3: Avoid E-mail Phishing Scams

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to assess their data security policies and review critical … Continue reading

Posted in Cyber scams, Cyber Security, Data Breach, E-mail phishing, Identity Theft, IRS, Malware

Share this Article:

Taxpayer CyberSecurity — Step 2: Create A Data Security Plan

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to assess their data security policies and review critical … Continue reading

Posted in Cyber Security, Data Protection, IRS, Personal Information, Uncategorized

Share this Article:

Taxpayer CyberSecurity — Step 1: Protect Your Systems!

In March 2015, the Internal Revenue Service (“IRS”) convened an unprecedented coalition of state tax agencies and private-sector tax industry officials to fight back against emerging criminal syndicates exploiting sensitive taxpayer information by creating the Security Summit. The Security Summit … Continue reading

Posted in Cyber Security, Data Protection, IRS, Personal Information, Privacy

Share this Article:

Facing the Issue: San Francisco Bans City Use of Facial Recognition Technology

On May 21, 2019, the City of San Francisco passed an ordinance banning the use of facial recognition software by police and other city agencies.  The San Francisco Board of Supervisors voted 8-1 in favor of the ban, which went … Continue reading

Posted in California, Facial Recognition Technology, Government Regulations, Law Enforcement, Privacy

Share this Article:

What Does the New Utah Electronic Data Privacy Law Do?

Utah recently became the first state to enact a law specifically designed to protect private electronic information stored with third parties from collection by law enforcement without a valid warrant.  Utah Governor Gary Herbert signed the ground-breaking legislation on March … Continue reading

Posted in Data Protection, Electronic devices, Government Regulations, Law Enforcement, Personal Information, Privacy, State Privacy Laws, Utah

Share this Article:

The Anatomy of an FTC Data Security Lawsuit

The Federal Trade Commission (“FTC”) has described itself as “Your cop on the privacy beat” and a top federal regulator of consumer-facing data security practices.  An example of how the FTC asserts itself when it comes to data security and … Continue reading

Posted in Cyber Security, Data Breach, Data Protection, FTC, Government Regulations, Internet of Things, IoT, Personal Information, Privacy

Share this Article:

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Another day, and another form of hacking comes to light.  On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip “Defending Against Illicit Cryptocurrency Mining … Continue reading

Posted in Blockchain, Cryptocurrency, Cryptojacking, Cryptomining, Cyber Security, DHS, Malware, US-CERT

Share this Article:

Supreme Court: Warrant Usually Required For Cell Tower Records to Track a Person’s Movements

On June 22, 2018, the United States Supreme Court ruled in a 5-4 decision that the government generally needs a search warrant to track a person’s location through cell phone location records.  The opinion, in Carpenter v. United States was … Continue reading

Posted in Digital Devices, Digital evidence, Electronic devices, Government Regulations, Law Enforcement, Personal Information, Privacy

Share this Article: