Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
There is a reason we don’t all have a definitive digital identifier. I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more
The U.S. Court of Appeals for the Third Circuit added its voice to the chorus of circuit courts of appeal that have held that alleged procedural violations of the Fair and Accurate Credit Transactions Act (FACTA), such as the...more
The U.S. Court of Appeals for the Third Circuit recently held, for the first time, that a mere procedural violation of a statute does not present the material risk of harm that a plaintiff must allege to establish Article III...more
The federal government has begun mailing new Medicare cards to 59 million Americans. You should keep track of when your new card will arrive and contact Medicare if you don't receive it....more
It is one thing to steal our identity as an adult, but children are defenseless against this type of fraud. According to Experian, it handles 25,000-30,000 cases of identity theft and fraud every year and a whopping 17...more
Several recent federal court decisions have shed additional light on the still-unsettled question of when a plaintiff has Article III standing to sue based on a data breach or other data security or privacy event. These...more
With more and more information online, it is easy to accumulate a lot of information about individuals just by using a search engine. Scammers use online information to build profiles of victims and then use different scams...more
Sen. Franken Hits Pause on Pokémon GO - After the Pokémon GO app was downloaded approximately 7.5 million times in the United States alone in its first week of release, Sen. Al Franken (D-Minn.), the chairman of the...more
Privacy is a social norm, sometimes captured in laws and regulations, which sets limits on the collection, protection, processing, and deletion of personal information. As has become increasingly clear in recent years,...more
The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more
I have spent some time over the past few weeks concentrating on steps individuals can take to protect their privacy and identity. But how do you protect your child’s identity?...more
On September 16, 2015, the IRS issued proposed regulations concerning the time and manner for donee organizations to file information returns that report required information about charitable contributions. The proposed...more
Three privacy/security stories that you should know as you start your week: President Obama to Offer Cybersecurity/Privacy Previews to State of the Union Proposals - In a series of speeches this week, President...more