military data breach

OPM and U.S. Military Data Breaches

In the hacking world, a few of the most favored data breach targets include governmental agencies and militaries. Whether it is the challenge of hacking these presumably highly secure entities, or the thrill and notoriety associated with a successful hack, governments and militaries are constantly subjected to cyber threats. InIn the hacking world, a few of the most favored data breach targets include governmental agencies and militaries. Whether it is the challenge of hacking these presumably highly secure entities, or the thrill and notoriety associated with a successful hack, governments and militaries are constantly subjected to cyber threats. In

general data protection regulation

General Data Protection Regulation

Ever since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it with ill intentions. Because of the great weight held by the United StatesEver since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it with ill intentions. Because of the great weight held by the United States

data breach notification laws

What are Data Breach Notification Laws?

What are data breach notification laws? Many people have heard about, or have themselves been potentially victimized by a data breach. Your credit card information might have been hacked, or your personal identifying information might have been exposed in a data security breach. But many people do not realize thatWhat are data breach notification laws? Many people have heard about, or have themselves been potentially victimized by a data breach. Your credit card information might have been hacked, or your personal identifying information might have been exposed in a data security breach. But many people do not realize that

prepare for data breaches

Businesses Must Prepare for Data Breaches

Data breaches involving businesses are happening all the time. The best way for a company to deal with a hack is to prepare for data breaches before it happens. It does not matter what size your business is, if hackers can easily access personal information stored in your company’s system, they willData breaches involving businesses are happening all the time. The best way for a company to deal with a hack is to prepare for data breaches before it happens. It does not matter what size your business is, if hackers can easily access personal information stored in your company’s system, they will

credit card breach madison square gardens

Latest Credit Card Breach: Madison Square Gardens

Madison Square Garden and a small number of other major entertainment venues owned by Madison Square Garden Co. recently announced that their payment systems were hacked for a year-long period. Credit card information of customers who visited the affected establishments may have been breached. According to Gizmodo.com, Madison Square Garden,Madison Square Garden and a small number of other major entertainment venues owned by Madison Square Garden Co. recently announced that their payment systems were hacked for a year-long period. Credit card information of customers who visited the affected establishments may have been breached. According to Gizmodo.com, Madison Square Garden,

healthcare security breach

Healthcare Security Breach: $650,000 HIPAA Settlement

University of Massachusetts Amherst was recently hit with a Health Insurance Portability and Accountability Act (HIPAA) compliance settlement by federal regulators after suffering an healthcare security breach in 2013, according to DataBreachToday.com. The school had failed to include its Language, Speech, and Hearing Healthcare Services as part of a HIPAA-coveredUniversity of Massachusetts Amherst was recently hit with a Health Insurance Portability and Accountability Act (HIPAA) compliance settlement by federal regulators after suffering an healthcare security breach in 2013, according to DataBreachToday.com. The school had failed to include its Language, Speech, and Hearing Healthcare Services as part of a HIPAA-covered

respond to a breach of customer data

How to Respond to a Breach of Customer Data

How do you respond to a breach of customer data? If you operate an ecommerce store, you need to know. Revision Legal partner John DiGiacomo has published another article on Practical Ecommerce: How to Respond to a Breach of Customer Data. Data breaches seem to be the norm these days, whetherHow do you respond to a breach of customer data? If you operate an ecommerce store, you need to know. Revision Legal partner John DiGiacomo has published another article on Practical Ecommerce: How to Respond to a Breach of Customer Data. Data breaches seem to be the norm these days, whether

data security

Data Security: How to Keep Your Data Safe

Data security involves the practice of protecting computers, mobile devices, databases, and websites from unauthorized access or corruption. Data security is also sometimes also referred to as computer security or information security. Keeping Data Safe Every kind of data needs protecting, whether it is personal data or business data. DataData security involves the practice of protecting computers, mobile devices, databases, and websites from unauthorized access or corruption. Data security is also sometimes also referred to as computer security or information security. Keeping Data Safe Every kind of data needs protecting, whether it is personal data or business data. Data

hacked credit card

Hacked Credit Card: The Biggest Consumer Risk

A hacked credit card is one of the biggest problems consumers face. Someone who is not authorized to use a card can gain access to the credit card number, the name on the card, and the PIN. They can then use this information to make unauthorized purchases. Alternatively, hacked credit cardA hacked credit card is one of the biggest problems consumers face. Someone who is not authorized to use a card can gain access to the credit card number, the name on the card, and the PIN. They can then use this information to make unauthorized purchases. Alternatively, hacked credit card

illinois data breach law

Illinois Data Breach Law

The State of Illinois has enacted the “Personal Information Protection Act,” 815 ILCS §§ 530/1 – 530/25. The Act includes important provisions about how to respond to a data breach. The law also details who are subject to Illinois’ law, and the proper method of notification. Am I Subject to theThe State of Illinois has enacted the “Personal Information Protection Act,” 815 ILCS §§ 530/1 – 530/25. The Act includes important provisions about how to respond to a data breach. The law also details who are subject to Illinois’ law, and the proper method of notification. Am I Subject to the