Latest Publications

Share:

Illinois Biometric Case Against Shutterfly Survives

We have been following biometric cases in Illinois, including the case against Shutterfly. Late last week, an Illinois federal judge denied Shutterfly’s motion to dismiss the case against Shutterfly alleging that it violates...more

Vevo Hacked through LinkedIn Message

Vevo announced this week that it experienced an intrusion into its servers by the hacking collective OurMine, self-described as a white hat organization that informs individuals and organizations of potential security...more

Privacy Tip #106 – Online Romance Scams

I haven’t been in the dating scene for decades but I know it sure has changed. Millions of people participate in online dating, and I even know several couples who have found their significant other using online dating...more

The Biggest Health Care Data Breaches in 2017

Health Data Management (HDM), using information compiled by Protenus Breach Barometer, published a list this week of the biggest health care data breaches so far in 2017....more

Privacy Tip #105 – Data Breach Woes

I spend a lot of time and effort to protect the privacy of my personal information. I am very careful. I have pretty good security hygiene. But I don’t have total control of my personal information and it is frustrating. I am...more

IRS Warns of Phishing Email Spoofing IRS and FBI

The Internal Revenue Service (IRS) has issued a warning alerting the public to a new email phishing scam that looks like a joint notice from the IRS and FBI about new tax laws....more

9/14/2017  /  Email , FBI , IRS , Phishing Scams , Popular , Spoofing

Lenovo Agrees to Settle Data Security Case with FTC and 32 AGs

The Federal Trade Commission (FTC) announced on September 5, 2017, that it has settled with Lenovo regarding allegations that Lenovo “harmed customers by pre-loading software on some laptops that compromised security...more

Cisco Releases Midyear Cybersecurity Report

We continue to try to alert our clients about the changing threat landscape in cybersecurity. We keep saying how the threats are becoming more and more sophisticated and more and more frequent, and that companies must...more

FDA Issues Final Guidance For Medical Device Exchange of Patient Information

The Food and Drug Administration (FDA) issued guidance yesterday (September 6, 2017) entitled “Design Considerations and Pre-Market Submission Recommendations for Interoperable Medical Devices,” which is intended to “assist...more

FDA Recalls St. Jude Medical Pacemakers for Cybersecurity Patches

The Food and Drug Administration (FDA) has issued a recall of 465,000 St. Jude Medical pacemakers in order to push a mandatory firmware patch of vulnerabilities in six types of radio controlled cardiac pacemakers....more

Civilian Drones Asked to Stay Out of the Sky During Hurricanes

For years, drones have been used to support recovery efforts in the aftermath of floods and other disasters, and the aftermath of Hurricane Harvey is proving to be no different, and we suspect that the same will be true...more

Privacy Tip #104 – Scammers Prey on Hurricane Victims

It has been so difficult to watch the news reports of the devastation and havoc left in the wake of Hurricane Harvey, and now anticipated this weekend by Hurricane Irma, which is being reported as the most powerful storm to...more

Delaware Updates its Data Breach Notification Law

Forty-eight states have enacted data breach notification laws, and they frequently are amended and updated. The most recent state to update its law is Delaware. ...more

Drones Delivering Medical Supplies in East Africa but not in U.S.

Residents in remote areas of Tanzania and Rwanda in East Africa are receiving medical supplies through the use of drones, far surpassing similar efforts in the U.S., according to Robert Graboyes, a senior research fellow at...more

Privacy Tip #103 – Smartphone Replacement Parts Subject to Hacking

You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more

Navy Investigating Whether Ship Collision Resulted from Cyber-Attack

The United States Navy is investigating whether the recent collision of the USS John S. McCain with a Liberian tanker off Singapore may have been caused by a cyber-attack....more

NIST Updates Digital Identity Guidelines for Federal Agencies

This month, the National Institute of Standards and Technology (NIST) announced in a Bulletin that it has updated its Digital Identity Guidelines, which “provides agencies with technical guidelines regarding the digital...more

Privacy Tip #102 – How to Educate Your Employees to Use Long, Easy to Remember Passwords

I feel like I have been writing about Passwords over and over and that’s because I have. Despite hearing about how important passwords are over and over again, compromised passwords continues to be an issue for organizations....more

Privacy Tip #101 - A Recap of our Top 10 Privacy Tips

Last week, our Data Privacy + Cybersecurity Insider reached a milestone—we hit our 100th privacy tip! This week, we mark that milestone with a special edition Privacy Tip: the top 10 most-viewed privacy tips. Our readers can...more

NIST Publishes Updated Cybersecurity Guidance and Guidance on Passwords

The National Institute of Science and Technology (NIST) has long been a leading authority in Cybersecurity—even before Cybersecurity became a household name. It originally published its Cybersecurity Framework-intended not...more

Siemens Medical Equipment Vulnerable to Cyber-Attacks

The Department of Homeland Security and Siemens Healthineers has identified cybervulnerabilities in the Windows 7-based versions of Siemens PET/CT systems, SPECT systems, SPECT/CT Systems and SPECT Workplaces/Symbia.net and...more

Privacy Tip #100 – Scary Statistics on Identity Theft of Children

It is one thing to steal our identity as an adult, but children are defenseless against this type of fraud. According to Experian, it handles 25,000-30,000 cases of identity theft and fraud every year and a whopping 17...more

Connecticut Insurance Department Issues Bulletin on Data Security Requirements

We previously outlined the requirements of the Connecticut data breach law when it was amended in 2015, including the requirement to implement a comprehensive information security program (CISP)....more

Nevada Implements Law that Requires Notice for Collection of Personal Information

Nevada has become the third state in the Union to adopt a law that requires operators of websites and online services to provide notice to consumers who are Nevada residents of their practices around the collection and...more

OCR Releases “Improved Web Tool” for Breach Reporting

The Office for Civil Rights (OCR) recently issued an “improved web tool that puts important information into the hands of individuals, empowering them to better identify recent breaches of health information and learn how all...more

744 Results
/
View per page
Page: of 30

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.