Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Today’s mobile workforce means that many employees blend their personal and professional lives on the same devices, possibly putting organizations’ data at risk. During the holiday season, in the search for gifts, low prices,...more
Dark Reading reports that thousands of college and university students are being targeted by cyber-attackers who are using a legitimate domain to impersonate Instagram and steal credentials of the users. The attack is able to...more
Some of those who are fortunate enough to have received the COVID-19 vaccine are so excited that they have been posting their vaccine card on social media accounts. ...more
I was scrolling through a social media site this week, and was struck by how many requests asked people to respond to questions regarding their biographical information. For example, what was the number one album when you...more
The past few months have been hard on many people and businesses. Some of us may even know individuals who lost their job due to the pandemic. Unfortunately, there are always those who prey on the misfortunate...more
I was so honored to be a presenter at the Bryant Women’s Summit last week. It is always an incredible event and I enjoy attending every year. ...more
I haven’t been in the dating scene for decades but I know it sure has changed. Millions of people participate in online dating, and I even know several couples who have found their significant other using online dating...more
Last week, there were developments in two cases in different Pennsylvania courts involving employer liability—or lack thereof—for data breaches involving employee personally identifiable information (PII). A Pennsylvania...more
Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more
The Washington Post recently published an article reminding individuals not to tweet or otherwise share information concerning their medical conditions on social media, warning that disclosing such information publicly “is...more
In This Issue: Regulatory Updates - SEC Proposes Money Market Reform; SEC Eases Ban on General Solicitation and General Advertising in Certain Private Placements; SEC and CFTC Adopt Joint Rules to Address...more
Board Oversight of Distribution and Financial Intermediaries - One of the SEC’s stated focuses is on payments for “distribution in guise.” Mutual funds are only permitted to pay for distribution of their shares if...more