Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
CYBERSECURITY - Hackers Experimenting with Deploying Destructive Malware - It’s a cold, hard fact that hackers don’t really care about their victims or their victims’ data or business. They are greedy, evil human...more
CYBERSECURITY - FBI Issues Notice to Health Industry Highlighting Risks of Unpatched Medical Devices - The FBI issued a Private Industry Notification targeted to the health care sector on September 12, 2022, warning...more
CYBERSECURITY - Chinese APT41 Attacking State Networks - Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber...more
As we look to 2022, a question on many companies’ minds is what actions we will see from the FTC. Two recent developments are important on that front. First, the FTC recently signaled its intent to initiate rulemaking on...more
The FTC has released its annual report summarizing its activity during 2017 relating to privacy and data security issues. In its self-declared role as “the nation’s primary privacy and data security enforcer,” the FTC...more
It is one thing to steal our identity as an adult, but children are defenseless against this type of fraud. According to Experian, it handles 25,000-30,000 cases of identity theft and fraud every year and a whopping 17...more
I have spent some time over the past few weeks concentrating on steps individuals can take to protect their privacy and identity. But how do you protect your child’s identity?...more
The News Journal article highlighted passage by the Delaware legislature in 2014 of House Bill 295, now codified as 6 Del. C. §5001C et seq.: Safe Destruction of Records Containing Personal Identifying Information. Much of...more
Retail Tracking Update: Privacy Guidance Following Nomi Technologies - There is currently a widespread effort to quantify everything, from steps, to sleep, to batted ball exit velocity. Fifteen years ago, TV host Jeremy...more