Setting new precedent in the world of data, the FTC has found that the work product of ill-gotten data is no longer retainable by the developer. On January 11, 2021, the U.S. Federal Trade Commission (FTC) announced that it...more
3/18/2021
/ Algorithms ,
Biometric Information ,
Data Collection ,
Data Retention ,
Enforcement Actions ,
Facial Recognition Technology ,
Federal Trade Commission (FTC) ,
Mobile Apps ,
Section 5 ,
Software ,
Software Developers ,
Unfair or Deceptive Trade Practices
Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more
5/26/2016
/ Bug Bounty Program ,
Confidential Information ,
Crowdsourcing ,
Data Security ,
Extortion ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Third-Party Service Provider ,
Unauthorized Access ,
Vulnerability Assessments ,
Young Lawyers