Best Practices for Cybersecurity in Vehicles

In response to increasing cybersecurity threats in vehicles, in 2015 the Automotive Information Sharing and Analysis Center (Auto-ISAC) was formed.  Its member companies include all automakers operating in North America except for Tesla. The ISAC allows companies to share cyberthreat … Continue reading

Posted in Cyber Security

Share this Article:

What’s In The Cybersecurity Act of 2015?

The Cybersecurity Act of 2015 became law on December 18, 2015. It’s the biggest piece of cybersecurity legislation passed by Congress in recent years. It authorizes and protects certain information-sharing for cybersecurity purposes. The terms “company” and “companies” are used … Continue reading

Posted in Cyber Security, Government Regulations

Share this Article:

What are Key Issues for the Internet of Things in 2016?

What will be the key issues for the Internet of Things in 2016? JD Supra Business Advisor asked me and other privacy and data security lawyers to comment. Securing these devices is at the top of the list. Here’s the … Continue reading

Posted in Internet of Things

Share this Article:

How to Protect and Secure Your Connected Devices

The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices. We previously reported on what the Internet of Things is … Continue reading

Posted in Internet of Things, Wi-Fi

Share this Article:

“Pocket-Dial” Mobile Phone Calls: Private or Not?

If you accidentally “pocket dial” someone on your mobile phone, do you have a reasonable expectation of privacy about what’s said in that call? Here’s how courts looked at this issue recently. What Happened? James Huff is the former chairman … Continue reading

Posted in Privacy

Share this Article:

What’s The “Internet of Things” and What Are Its Legal Challenges?

The “Internet of Things” is the universe of smart devices that talk to the internet or to one another. The devices have unique identifiers and the ability to automatically transfer data over a network on their own, without human interaction. … Continue reading

Posted in Data Protection, Electronic devices, Internet of Things, Privacy

Share this Article:

Travelers, Beware the “Darkhotel” Hacks Over Hotel Internet

Business travelers may be targeted and hacked through hotel Wi-Fi networks, according to a recent report by Kaspersky Lab. Hackers have been stealing company data from top executives at luxury hotels in an attack known as “Darkhotel.” The scheme steals … Continue reading

Posted in Cyber Security, Electronic devices

Share this Article:

Information Security Contracts: Protecting Customer Data

Does your business exchange customer data with other businesses?  Does that customer data relate to identified or identifiable people?  Who do you exchange data with?  If you provide customer data to other companies, it may be time to consider contracts … Continue reading

Posted in Data Protection

Share this Article:

Privacy and The Cell Phone

A recent United States Supreme Court decision analyzed privacy and electronic evidence in a new and detailed way. The case was Riley v. California, and the opinion was issued on June 25, 2014. The Riley case was about the police’s … Continue reading

Posted in Digital evidence, Privacy

Share this Article:

Welcome to our Blog!

Welcome to “Into the Breach…”, a new blog created by Snell & Wilmer’s Privacy, Data Protection and Cyber Security practitioners. We’re excited to share our thoughts and insights with you about this rapidly-evolving practice area. Our goal is to provide … Continue reading

Posted in Cyber Security, Data Breach, Data Protection, Privacy

Share this Article: