The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/27/2019
/ Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Theft ,
Hackers ,
Identity Theft ,
IRS ,
Personally Identifiable Information ,
Popular ,
State Taxes ,
Tax Returns
The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/15/2019
/ Cyber Crimes ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
Income Taxes ,
IRS ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Social Security Numbers ,
Tax Planning ,
Tax Returns
The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/14/2019
/ Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Data Theft ,
Email ,
FBI ,
Hackers ,
IRS ,
Phishing Scams ,
Popular ,
Ransomware
The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/9/2019
/ Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
Identity Theft ,
Information Security ,
IRS ,
Personally Identifiable Information ,
Popular ,
Tax Planning
In March 2015, the Internal Revenue Service (“IRS”) convened an unprecedented coalition of state tax agencies and private-sector tax industry officials to fight back against emerging criminal syndicates exploiting sensitive...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
6/27/2018
/ Bitcoin Mining ,
Blacklist ,
Computer Servers ,
Computer Virus Protection ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Mining ,
Data Protection ,
Data Security ,
Digital Currency ,
Hackers ,
Internet of Things ,
Malware ,
Mobile Devices ,
Operating System Developers ,
Passwords ,
Popular ,
Risk Mitigation ,
Software Developers ,
US-CERT ,
User Names ,
Websites
This is the second in a two-part series addressing recent developments in state privacy and data security laws. This article addresses new laws about student privacy, enforcement/ punishment for data privacy and security...more
2/20/2017
/ Cyber Crimes ,
Cybersecurity ,
Data Privacy ,
Data Protection Acts ,
Data Security ,
Gramm-Leach-Blilely Act ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HITECH Act ,
Identity Theft ,
NYDFS ,
Popular ,
State Data Breach Notification Statutes ,
Student Privacy ,
Unlawful Trade Practices Acts
On January 10, 2017, as the Obama administration draws to a close, the National Institute of Standards and Technology (“NIST”) released a long-awaited draft version 1.1 of its ground-breaking Framework for Improving Critical...more
Utah, like most U.S. states, has enacted laws concerning data security and steps to take when a data breach occurs. Here is what Utah law provides as codified in Utah Code Ann §§ 13–44–101 et seq. The law has been in effect...more
Earlier this week Apple CEO Tim Cook announced to Apple customers that the company would oppose a federal court order (the “Order”) issued on February 16, 2016 that the company believes “threatens the security of our...more
2/22/2016
/ All Writs Act ,
Apple ,
Data Protection ,
Department of Justice (DOJ) ,
Electronic Frontier Foundation ,
Ex Parte ,
FBI ,
iPhone ,
Motion to Compel ,
Popular ,
Terrorist Acts
Life just got a lot more confusing, complicated and expensive for organizations that transmit personal data to the United States from the European Union (EU) under the frequently-used U.S. – EU Safe Harbor program. Why?...more
10/7/2015
/ Data Protection Authority ,
EU ,
EU Data Protection Laws ,
European Court of Justice (ECJ) ,
International Data Transfers ,
National Security ,
Personal Data ,
Popular ,
Privacy Policy ,
Safe Harbors ,
Umbrella Agreement ,
US-EU Safe Harbor Framework
A fictional cyber-terrorist weaponizing a medical device by hacking into it has become a familiar plot premise in recent Hollywood dramas. Unfortunately, the risk of harm from medical device hacking has now become an...more
On July 20, 2015, a federal appeals court in Chicago issued what could be a watershed ruling in favor of consumers pursuing class action lawsuits against retailers and other companies following data breaches that involve the...more
7/23/2015
/ Appeals ,
Clapper v. Amnesty International ,
Class Action ,
Corporate Counsel ,
Data Breach ,
Debit and Credit Card Transactions ,
Imminent Harm ,
Injury-in-Fact ,
Neiman Marcus ,
Personally Identifiable Information ,
Popular ,
Retailers ,
Reversal
In May 2015, the Ponemon Institute released its tenth annual Cost of Data Breach Study, sponsored by IBM. The study sets forth the average calculated cost for each lost or stolen record containing “sensitive and confidential...more
On April 28, 2015, the U.S. Securities and Exchange Commission’s Division of Investment Management (the “Division”) issued a Guidance Update to investment and fund advisers on the topic of improving cyber security. While it...more
A privacy policy is a key legal document in this new era of Big/Data/Breaches. When distilled to its essence, a privacy policy is simply “say what you do, and do what you say” with others’ personal information. A growing...more
Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata....more
Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more