News & Analysis as of

Passwords

Update: Case Involving Sharing Of Passwords May Be Headed To The Supreme Court

by Jackson Lewis P.C. on

Last August, we reported on a Ninth Circuit case in which a former employee was convicted of a crime under the Computer Fraud and Abuse Act (“CFAA”) for accessing and downloading information from his former company’s database...more

Privacy Perils: Strong Passwords IV: The Phrase Awakens

by Bass, Berry & Sims PLC on

Previous Tips have warned of the use of easily-guessed passwords, and have provided suggested methods to strengthen them, including use of...more

Coming Soon: Two-Factor Authentication for Social Security Website

by BakerHostetler on

The Social Security Administration recently announced that beginning June 10, two-factor authentication will be required for all account holders logging into the “My Social Security” portal. To comply with this new rule,...more

Hacker Hits HipChat—Reset Passwords

An unknown intruder was able to access team communication platform HipChat last weekend, allowing access to the account information of users, including email addresses, hashed passwords and names. There is also a chance that...more

Facebook’s New Software Suggests Passwords May One Day be Obsolete

Facebook says that someday ‘the password’ will be a distant memory. But for now, passwords are certainly necessary. However, Facebook has released a beta version of its Delegated Account Recovery software –a new way for...more

Privacy Perils: The Untimely Death of Digital Data

by Bass, Berry & Sims PLC on

Many people have thoughtfully gathered information on the location of their bank accounts, deeds, lock boxes, safe combination, car title (and keys), investment accounts, check books, and other assets to make handling their...more

Hackers, Keep Out!

by McManis Faulkner on

Hackers are getting more sophisticated each day. It is our job to try and stay a step ahead of them. There is always someone on the outside trying to get in. It is imperative to keep your data secure within your business...more

On the Border: Lawmakers Seek to End Warrantless Searches of Electronic Devices by Border Authorities

by Snell & Wilmer on

The controversial practice of U.S. Customs and Border Protection (CBP) agents randomly demanding that Americans turn over passwords to their mobile devices so they can be searched at the border and at ports of entry may be...more

Privacy Tip #81 – LastPass Users—Listen Up!

People always ask me if I use a password manager. The answer is no. I am too paranoid to put all of my passwords in one place. Instead, I prefer to use variations on complex pass phrases that I can remember and I change them...more

Cyber Update: Five Tips from the Front Lines of Practice to Limit Your Company’s Losses from a Breach

by Carlton Fields on

We help companies prepare for, respond to, and clean up data breaches and related events. We are lawyers, but in this role, we often look over the shoulders of cybersecurity technical experts, who are advising companies on...more

Border Searches of Your Electronic Devices — What Rights Do You Have?

by Foley Hoag LLP on

The United States government has reported that border searches of electronic devices in the U.S. increased from 4,764 in 2015 to 23,877 in 2016. Because electronic devices have immense data storage capacity and can hold...more

Immigration Fact or Fiction for the U.S. Employer: CBP Searching Electronic Devices – A New Thing?

There has been heightened interest and concern regarding the potential for U.S. Customs and Border Protection (CBP) to search laptops and smart phones at the port of entry, due to the mention of such searches in one of...more

Fiduciary Access To Digital Assets

by Pessin Katz Law, P.A. on

I don’t need to tell you that social media has become a mainstream way to communicate ideas, photos, and information. Even the President uses this technology as a prime form of expression. Have you considered what happens to...more

Privacy Tip #74 – What to Do About Customs and Border Patrol

There has been lots of talk about the ripple effects of the Trump travel ban. But here’s a new twist I hadn’t heard before—U.S. Customs and Border Control (CBP) agents are detaining U.S. citizens and requiring them to unlock...more

New laws may give fiduciaries power to access digital assets

by Thompson Coburn LLP on

Historically, estate planning has been concerned with tangible assets, such as real estate and personal property, and intangible assets, such as securities and other investment assets. In the digital age, estate planning...more

Good Advice for Everyone: Ten Steps to Avoid Big Trouble

by Varnum LLP on

On both a business and individual level, there are ten easy steps you can take now to avoid big trouble later. If you address just five of these items this month, you will be half way there. Originally published in the...more

Notable New State Privacy and Data Security Laws – Part One

by Snell & Wilmer on

States aren’t static when it comes to data privacy and security laws. This is Part One of a two-part series about several new state privacy and data security laws that took effect within the last year. In this article,...more

Major League Baseball fines Cardinals and Plucks Draft Picks for Hacking the Astros

It doesn’t always pay to be a hacker. Major League Baseball (MLB) this week made a strong statement about its tolerance for teams hacking other teams. We previously reported on the incident when a Cardinals employee hacked...more

Unauthorized Computer Access, Without Service Interruption, May Be Cause for Action

by Taylor English Duma LLP on

In a case of first impression, the Eleventh Circuit has held that an employer need not show an interruption of service to prove actionable harm under the Computer Fraud and Abuse Act (CFAA) and other federal laws. This is...more

Data Privacy Day? Yep, it’s a Thing.

by Snell & Wilmer on

For a number of years now, January 28 has been marked as “Data Privacy Day” (or, for our European friends, “Data Protection Day”), and it is often overlooked observed in the United States, Canada, India and many European...more

Simple Steps to Help Keep Your Trade Secrets Safe

by Foley & Lardner LLP on

As illustrated by the recent lawsuit by America’s Test Kitchen against celebrity chef Christopher Kimball, companies in a variety of industries are vulnerable to losing their trade secrets....more

What Happens to your "Social Media" and other "Digital" Life when you Die?

by Farrell Fritz, P.C. on

Over the holidays, it’s likely that you or a loved one received some type of computer or device that connects to internet websites, e-mail and applications. Or that pictures were taken and stored on such a device, or that...more

FTC sues IoT Device Manufacturer D-Link for Lax Cyber Security Practices

by Snell & Wilmer on

On January 5, 2017, the Federal Trade Commission (“FTC”) filed a complaint against computer networking hardware manufacturer D-Link Corporation, alleging that the company’s wireless routers, IP cameras, and other “Internet of...more

Three States Join Others to Expand Personal Information Definition to Include Usernames or Email Addresses

by Morgan Lewis on

Businesses should take steps to protect usernames, email addresses, passwords, and security questions and answers. A key issue in determining whether notification is required following a data breach is whether...more

Gifts that Don’t Quite Fit in Your Stocking: New Employment Laws Taking Effect in 2017

by Franczek Radelet P.C. on

A number of new state or local laws are set to take effect in Illinois in 2017 which will require employers to update their employee handbooks, employment agreements, and other policies and procedures. We address the key...more

322 Results
|
View per page
Page: of 13
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!