Subscribe Today
About This Blog
Search Blog
Blog Contributors
Topics
- Arizona
- Bankruptcy
- Blockchain
- Board of Directors
- California
- CCPA
- Colorado
- COVID-19
- Cryptocurrency
- Cryptojacking
- Cryptomining
- Customs and Border Protection
- Cyber scams
- Cyber Security
- Data Breach
- Data Centers
- Data Protection
- DHS
- Digital Devices
- Digital evidence
- DoD
- Drones
- E-mail phishing
- ECPA
- Electronic devices
- Estate Planning
- European Union
- FAA
- Facial Recognition Technology
- FBI
- FCC
- FDA
- FDIC
- FFIEC
- FTC
- Government Regulations
- HHS
- HIPAA
- Identity Theft
- Insurance
- Internet of Things
- IoT
- IRS
- Law Enforcement
- Malware
- Nevada
- New Mexico
- NIST
- Notification
- NSA
- PCI-DSS
- Personal Information
- Privacy
- Privacy Policy
- Privacy Shield
- Ransomware
- Safe Harbor
- SEC
- Social Media
- State Privacy Laws
- Student Privacy
- Uncategorized
- US-CERT
- Utah
- Wi-Fi
The DOJ’s New Cyber Security Best Practices — Creating a Standard of Care?
On April 29, 2015, the U.S. Department of Justice Computer Crime and Intellectual Property Section (“DOJ”) issued version 1.0 of its “Best Practices for Victim Response and Reporting of Cyber Incidents.” It draws on “lessons learned by federal prosecutors while … Continue reading
Posted in Cyber Security, Data Breach, Data Protection, Government Regulations
Share this Article:
Target’s Consumer Class Action Settlement: A New Way to Resolve Big Data Breach Cases?
Many will recall the 2013 holiday shopping season when Target announced that cyber thieves had accessed and stolen as many as 70 million customer credit and debit card numbers and extracted personal information for another 40 million customers. It remains one … Continue reading
Posted in Cyber Security, Data Breach, Privacy
Share this Article:
Can the NSA Legally Collect Telephone Metadata? The 9th Circuit Considers the Issue.
Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata. The legal battle over the constitutionality of warrantless government … Continue reading
Posted in Cyber Security, Data Protection, NSA, Privacy
Share this Article: