toggle accessibility mode

What is Revenge Porn?

Revenge porn is the posting of explicit photos or videos of another person without his or her permission, commonly by exes or a significant other. These videos or photos may have been consensual at the time they were taken, but once they are posted without one party’s permission, liability can ensue. Is Revenge Porn a… READ MORE

general data protection regulation

The EU Data Protection Law Affects Companies Worldwide

Earlier this month, I published the following article on Practical Ecommerce about the European Union’s GDPR and how it could effect e-commerce stores. You should read this article. You should take it seriously. I’ll admit it — we lawyers are risk averse. We tend to prepare clients for the terrors in the night that may never come…. READ MORE

california data breach notification law

California Data Breach Notification Law

California law takes the privacy of its residents seriously. Privacy is an inalienable right guaranteed to California residents by the California Constitution. It was the first state to enact laws protecting the rights of Californians to be notified of data security breaches. When it comes to data breaches in California, state agencies and businesses have a duty… READ MORE

Data Breach

8 Reasons You Need a Data Breach Attorney

With growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may be to blame. Perhaps an employee… READ MORE

chipped credit card fraud

Are New Chipped Credit Cards Really Safe From Fraud?

Recent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. The new chipped credit cards were… READ MORE

active cyber attacks

Active vs Passive Cyber Attacks Explained

Cyber attacks involve the unauthorized access of private or confidential information contained on computer systems or networks, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyber attack, a passive type attack, or some combination of the two. According to Symantec, both active and passive cyber attack types… READ MORE

data security breaches

America First! (in Data Security Breaches)

In the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of data security breaches that took place… READ MORE

FDA: Make Medical Device Cybersecurity a Top Priority

  At the end of December, the Food and Drug Administration (FDA) issued new guidance for medical device cybersecurity. The new guidance encourages medical device developers and producers to make cybersecurity of networked medical devices a top priority throughout the product development lifecycle. It did not take long after the issuance of this new guidance… READ MORE

Watch Netflix? Beware of the Latest Email Phishing Scam

A Netflix phishing scam has been identified and users in the United States are being cautioned about an email that targets credit card information and other personal data. A California-based cyber-security firm recently identified a phishing email campaign affecting the popular video streaming service’s customer base. This latest attack is just another example of how… READ MORE

top ten healthcare data breaches

Top Ten Healthcare Data Breaches of 2016

2016 was unkind when it comes to health care system data breaches. The top ten healthcare data breaches of 2016 affected more than 16 million people. There were more than 300 incidents of hacking and data security breaches throughout the year. The federal government tracks instances of healthcare data breaches and publishes its report for… READ MORE

Make better decisions for your business, and avoid the online legal traps.

LET'S DISCUSS YOUR CASE