Steven Caponi

Steven Caponi

Blank Rome LLP

Contact  |  View Bio  |  RSS

Latest Publications

Share:

The Celebrity Hacking Scandal and You: 3 Takeaways for Everyone

By now we all know a hacker accessed the personal iCloud accounts of dozens of A-list celebrities and leaked nude photos of stars such as Jennifer Lawrence, Kate Upton, Kirsten Dunst, and Victoria Justice. The anonymous...more

9/17/2014 - Celebrities Cloud-Based Services Communications Decency Act Cybersecurity Data Breach Hackers Photographs

The Celebrity Hacking Scandal and You: 3 Takeaways for Everyone

With little ability to undo the damage caused by an embarrassing data breach, nearly insurmountable obstacles preclude a civil/criminal prosecution, and a cloud service agreement rendering a contract action against the...more

9/5/2014 - Cloud Computing Communications Decency Act Hackers Legal Perspectives Right to Be Forgotten

Did Russian Hackers Really Amass Over a Billion Passwords?

It was widely reported yesterday in The New York Times and elsewhere that a sophisticated Russian crime ring was holding a massive cache of stolen Internet credentials. According to the private security firm Hold Security, a...more

8/7/2014 - Cyber Attacks Data Breach Hackers Popular Russia

Delaware Adopts Law Requiring the Destruction of Consumers’ Personally Identifiable Information

On July 1, 2014, Delaware Governor Jack Markell signed into law Delaware House Bill 295, which amends Section 6 of the Delaware Code relating to trade and commerce. The new law, 6 Delaware Code §§50C-101 thru 50C-401, places...more

7/24/2014 - Corporate Counsel Document Destruction New Legislation Personally Identifiable Information

Goodwill Investigating Possible Data Breach

Yesterday it was announced that a number of financial institutions reported tracking what could be a series of credit card breaches involving various Goodwill locations nationally. Goodwill operates more than 2,900 stores...more

7/23/2014 - Data Breach Data Protection Goodwill Popular

Cybersecurity—There Is an App for That!

Many of our readers and those active in cybersecurity have been following ThreatWatch from Nextgov. This highly informative site provides a daily snapshot of the data breaches impacting organizations and individuals on a...more

7/22/2014 - Cyber Attacks Cybersecurity Data Breach iPhone Mobile Apps ThreatWatch

Wyndham Secures Interlocutory Appeal Challenging the FTC’s Authority to Regulate Cybersecurity Practices

As part of our ongoing effort to advise clients on significant developments in cybersecurity that are likely to impact their businesses, we have been actively reporting on the case of in FTC v. Wyndham Worldwide Corporation,...more

6/30/2014 - Appellate Review Cybersecurity FTC FTC v Wyndham Interlocutory Appeals Wyndham

Back Off Business, Cybersecurity Is FTC's Turf Now

On March 7, 2014, U.S. District Judge Esther Salas in New Jersey issued a much anticipated decision rejecting a direct challenge to the Federal Trade Commission’s authority to police corporate cybersecurity practices. Seeking...more

6/11/2014 - Cybersecurity Data Protection FTC FTCA Wyndham

Is the Password Finally Dead? Fernando Corbató Hopes So.

As noted in a recent article in the Wall Street Journal, although his impact on our daily lives arguably rivals that of Bill Gates, Mark Zuckerberg, and other giants in the computer industry, the name Fernando Corbató remains...more

5/29/2014 - Biometric Information Cyber Attacks Cybersecurity Heartbleed Passwords

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

5/20/2014 - China Cyber Espionage Cybersecurity Data Protection Foreign Policy Hackers

10 Results
|
View per page
Page: of 1