News & Analysis as of

Identity Theft Unauthorized Access

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Arnall Golden Gregory LLP

Business Account Takeover Fraud: Pursuing the Platform Is Rarely the Answer

Business account takeover (“ATO”) fraud occurs where a threat actor gains access to a business account on a payments platform (e.g., a payroll or accounts payable tool) or fraudulently creates such an account and engages in...more

AEON Law

Patent Poetry: “Likeness Law” Could Protect against AI Identity Theft

AEON Law on

A proposed bill in Congress aims to regulate the creation and use of digital replicas of human beings. The draft bill is called The Nurture Originals, Foster Art, and Keep Entertainment Safe Act, (“NO FAKES Act”). It was...more

Hogan Lovells

Ex-Microsoft software engineer convicted of embezzling $10 million in digital value

Hogan Lovells on

A Ukrainian man living in the U.S. is facing up to 20 years in prison after being convicted of 18 federal felonies to defraud his former employer Microsoft out of more than $10 million in digital value. ...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy 19, no. 12. Privacy Briefs - December 2019

Report on Patient Privacy 19, no. 12 (December 2019)  - Health care data breaches will have cost the industry $4 billion by the end of 2019, and 2020 is likely to be worse, reports a new survey from Black Book Market...more

Bass, Berry & Sims PLC

Privacy Perils: PayPal Data Breach

Bass, Berry & Sims PLC on

On December 1, PayPal disclosed that an ongoing investigation into identify security vulnerabilities identified a data breach that may have compromised personally identifiable information for roughly 1.6 million customers at...more

Foley & Lardner LLP

SEC Brings First Cybersecurity Enforcement Proceeding in Wake of Risk Alert

Foley & Lardner LLP on

Highlights Areas of High Risk and Examination Priorities for Financial Industry Firms - On September 15, the U.S. Securities and Exchange Commission’s (SEC’s) Office of Compliance, Inspections and Examinations (OCIE),...more

Seyfarth Shaw LLP

California Federal Courts Reiterate: Unless Computer Hacked, Computer Fraud and Abuse Act Permits Misuse Of Electronic Information

Seyfarth Shaw LLP on

In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide