Tag: privacy
Why Updating The Electronic Communications Privacy Act Poses Difficulties
The privacy of electronic communications is provided for under the Electronic Communications Privacy Act. There are limited circumstances in which ISPs may disclose the contents of electronic and stored digital communications. But the law is unclear as to what happens when data is transmitted into and stored in other countries with data security laws that… READ MORE
Recent Healthcare Data Breaches
Healthcare computer systems harbor the most useful three pieces of personal identifying information that can be used for fraud and identity theft – names, Social Security numbers, and dates of birth. With these three pieces of important and essential personal identifying data, hackers, fraudsters and impersonators can do virtually anything they would like. Increase in… READ MORE
Are Healthcare Systems Being Held Hostage by Ransomware?
Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow installed on a computer or provided access to vulnerable system network where the data on the computer or in the network is either… READ MORE
What is a Zero-Day Vulnerability?
In the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, phishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makes this type of vulnerability so… READ MORE
New Mexico Enacts New Data Breach Notification Laws
New Mexico recently became the 48th state in the US to adopt data breach notification laws. The new laws take effect June 16, 2017 and will apply in all situations in which a data breach occurs, i.e., an unauthorized attempt to access unencrypted or encrypted computerized data. In addition to providing governance on how personal… READ MORE
Tips to Help a Business Avoid Data Breach Litigation
Little else is as stressful for a company than handling the aftermath of a data breach. Not only does the company have the obligation of making notifications to clients about the data breach, but it may also be confronted by data breach lawyers with at least one lawsuit, or even a class action. There are… READ MORE
Employees Most Likely to Discover Data Security Breaches
One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, an undetected data breach can wind… READ MORE
GameStop Currently Investigating Possible Data Breach
GameStop is the most recent potential victim of cyber data breach, and the company recently hired a leading security firm to conduct an investigation into allegations that the company’s website was hacked and that customer data and credit card information was stolen. According to reports, a third party found data available for sale on a black… READ MORE
Launch of Swiss-US Privacy Shield Framework Announced by US Secretary of Commerce
International commerce is a huge business, but one of the challenges involved in conducting international business is that different countries may have different laws concerning privacy and the handling of personal data. Many companies in the United States conduct business in Europe, and Europe is well known around the world for being avidly in support… READ MORE
Permissible Disclosures Under the Stored Communications Act
The Stored Communications Act, which is codified at 18 USC 121, sections 2701-2712, is federal law that governs the conduct of electronic communication service providers and the voluntary and compelled disclosure of the contents of private electronic communications. The purpose of the Stored Communications Act is to protect privacy of electronic communications that are not… READ MORE