Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
A proposed bill in Congress aims to regulate the creation and use of digital replicas of human beings. The draft bill is called The Nurture Originals, Foster Art, and Keep Entertainment Safe Act, (“NO FAKES Act”). It was...more
On April 6, 2021, the North Carolina General Assembly introduced Senate Bill 569: the Consumer Privacy Act of North Carolina (CPA), that would expand protections to consumers in the North Carolina Identity Theft Protection...more
In this episode, Akin Gump public law and policy partner Ed Pagano and senior policy advisor Galen Roehl discuss privacy legislation being considered in the U.S. Congress....more
Early last year, I posted about tougher, bi-partisan privacy and data security legislation in the works in North Carolina. North Carolina State Representative Jason Saine (R), Senior Appropriations Chair, teamed-up with North...more
Data privacy regulation tends to take one of two general approaches. In most of the world—but not in the United States—the approach is usually characterized as “omnibus.” Under an omnibus regime, privacy rights are defined at...more
On its face, last week’s report that the number of data breaches reported last year to New York’s Attorney General spiked to an all-time high of 1,583 – up 23 percent from 2016 – was not good news....more
Identity theft, including business identity theft, is all too common. In its most straightforward form, the thief simply appropriates the identity of an individual or business and uses that identity to obtain goods,...more
The year was 2005. The iPhone was still two years away. Facebook was still a niche product. Tweeting was a birds-only activity. And North Carolina was one of the first states in the union to enact a data breach notification...more
A bi-partisan privacy and data security bill, which will significantly impact companies with North Carolina employees, is in the works. North Carolina State Representative Jason Saine (R), Appropriations Chairman of...more
As we near the end of a year that has seen more than its share of massive data breaches, two bills have been introduced (one re-introduced) in the U.S. Senate....more
On September 11, 2015, Senate Finance Committee Chairman Orrin Hatch (R-UT) and Ranking Member Ron Wyden (D-OR) introduced a bill aimed at combating identity theft and tax rebate fraud. The legislation comes as the Internal...more
On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more
President Barack Obama recognized in a speech he gave at the Federal Trade Commission on January 12th that identity theft poses a direct threat to the financial security of Americans. ...more
On December 22, 2014, Indiana became the latest state to propose legislation that will provide greater safeguards for personal and financial information online. The move in Indiana follows similar moves in California, New...more