Tag: privacy
What is Revenge Porn?
Revenge porn is the posting of explicit photos or videos of another person without his or her permission, commonly by exes or a significant other. These videos or photos may have been consensual at the time they were taken, but once they are posted without one party’s permission, liability can ensue. Is Revenge Porn a… READ MORE
The EU Data Protection Law Affects Companies Worldwide
Earlier this month, I published the following article on Practical Ecommerce about the European Union’s GDPR and how it could effect e-commerce stores. You should read this article. You should take it seriously. I’ll admit it — we lawyers are risk averse. We tend to prepare clients for the terrors in the night that may never come…. READ MORE
California Data Breach Notification Law
California law takes the privacy of its residents seriously. Privacy is an inalienable right guaranteed to California residents by the California Constitution. It was the first state to enact laws protecting the rights of Californians to be notified of data security breaches. When it comes to data breaches in California, state agencies and businesses have a duty… READ MORE
8 Reasons You Need a Data Breach Attorney
With growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may be to blame. Perhaps an employee… READ MORE
Are New Chipped Credit Cards Really Safe From Fraud?
Recent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. The new chipped credit cards were… READ MORE
Active vs Passive Cyber Attacks Explained
Cyber attacks involve the unauthorized access of private or confidential information contained on computer systems or networks, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyber attack, a passive type attack, or some combination of the two. According to Symantec, both active and passive cyber attack types… READ MORE
America First! (in Data Security Breaches)
In the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of data security breaches that took place… READ MORE
FDA: Make Medical Device Cybersecurity a Top Priority
At the end of December, the Food and Drug Administration (FDA) issued new guidance for medical device cybersecurity. The new guidance encourages medical device developers and producers to make cybersecurity of networked medical devices a top priority throughout the product development lifecycle. It did not take long after the issuance of this new guidance… READ MORE
Watch Netflix? Beware of the Latest Email Phishing Scam
A Netflix phishing scam has been identified and users in the United States are being cautioned about an email that targets credit card information and other personal data. A California-based cyber-security firm recently identified a phishing email campaign affecting the popular video streaming service’s customer base. This latest attack is just another example of how… READ MORE
Top Ten Healthcare Data Breaches of 2016
2016 was unkind when it comes to health care system data breaches. The top ten healthcare data breaches of 2016 affected more than 16 million people. There were more than 300 incidents of hacking and data security breaches throughout the year. The federal government tracks instances of healthcare data breaches and publishes its report for… READ MORE