Passwords

News & Analysis as of

Weak Baby Monitor Security Subject of FTC Internet of Things Study

On January 19, the Federal Trade Commission posted the results of a small study of baby monitor security, finding that four out of five devices tested did not have basic security procedures in place. The FTC warned that such...more

Oklahoma and Virginia become newest states to consider social media legislation

The list of states that have passed social media legislation is getting longer. Early next week, Oklahoma will become the newest state to consider social media legislation (along with approximately 23 others) to prohibit...more

Criminal or Civil Liability for Sharing Streaming Accounts?

We are at the beginning of a new era of media consumption. Traditional content delivery systems such as satellite and cable television are hemorrhaging customers to a wave of “cord cutting” that has been facilitated by the...more

FTC warns, connected baby monitors are more susceptible to hackers

At the PrivacyCon event held by the Federal Trade Commission (FTC) last week in Washington, D.C., the FTC warned that several brands of baby monitors lack basic security features like complex passwords and data encryption,...more

Password authentications should become more obsolete

The username/password method of authentication is dying, albeit slower than many of us would like. In 2016, we should see a continued trend of replacing password authentication as the primary method for navigating through...more

Privacy Tip #15 – Protecting your privacy during holiday travel

The holiday season means traveling to see family and friends, and is a wonderful time of year. That travel includes planes, trains and automobiles. Although that movie was hilarious, travel can be hazardous to the protection...more

Public-private team of security experts disrupt Dorkbot malware

This is how it should be—private companies working with law enforcement to disrupt evil doers on the Internet. Late last week, Microsoft announced that it teamed up with the Department of Homeland Security, Europol, the FBI,...more

Anonymous hacks login information of Paris climate summit attendees

In what has been described as a response to the arrests of protesters on a climate march in Paris this past Sunday in the midst of the United Nations Framework Convention on Climate Change (UNFCC), the hactivist organization...more

Game of Phones: Employer-Issued Smartphones and Employee Fifth Amendment Protections

A recent court decision holding that employees can claim the Fifth Amendment and refuse to unlock password-protected smartphones, even though the phones were issued by their employer for company business, demonstrates the...more

Highlights from the FTC’s Second “Start With Security” Initiative

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

Is It Ever Okay to Share Passwords?

If you’ve ever let your kids sign into your Netflix or HBO Go account, or given your marketing department access to your Twitter feed, you may be committing a federal crime, depending on how the Ninth Circuit rules on a case...more

Alert: Estate Planning for Digital Assets

Do you have a personal laptop computer, iPad, iPhone or other personal electronic device requiring an access password? Who, besides you, has that information? If something happens to you, how will your information be...more

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Nosal Update: Ninth Circuit Hears Oral Arguments on Password Sharing and Scope of Computer Fraud and Abuse Act

On October 20, 2015, a Ninth Circuit panel consisting of Chief Judge Sidney Thomas and Judges M. Margaret McKeown and Stephen Reinhardt heard oral argument from the U.S. Department of Justice and counsel for David Nosal on...more

Quick Guide to Trade Secrets

An overview of trade secrets, the critical business information that provides companies with a competitive edge. What are Trade Secrets? - Technical Information - Product formulas - Product designs ...more

Socially Aware: The Social Media Law Update Volume 6, Issue 4

Five social media law issues to discuss with your clients - The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this...more

New Maine Social Media Privacy Law Takes Effect October 15, 2015

Maine has become the latest state to restrict employers’ ability to access social media accounts of employees and applicants. A new Maine statute, which will go into effect on October 15, 2015, prohibits a broad range of...more

How to Protect and Secure Your Connected Devices

The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more

6,400 American Bankers Association members’ usernames and passwords compromised

Late last week, the American Bankers Association disclosed that its computer systems had been compromised exposing thousands of members’ personal information. The hacking occurred through its website’s shopping cart tool,...more

District Court Rules That Smartphone Passcodes Are Testimonial; Protected by Fifth Amendment

In Securities and Exchange Commission v. Huang, the district court held that the Fifth Amendment protected two former employees against having to disclose their personal passcodes for company-issued smartphones to government...more

FTC Gives Words of Warning to the Wise

The Federal Trade Commission has issued new guidance on data security to help businesses that collect, store and use consumer information to stay out of hot water with the agency. Gleaned from the more than 50...more

Blocked: Managing Social Media at Work Under Virginia’s New Privacy Law

With social media pervading all facets of society (no less than 67 percent of Americans are regular users), businesses have long been concerned with their employees’ potentially detrimental social media activities. As these...more

Notifying Parties In Username/Password Breaches . . . It’s Not Just the Law

As we head into the end of 2015, state legislators across the country continue to strengthen, update and, in some instances, broaden the scope of their respective state data breach notification laws. Specifically, many...more

Employees: Your Role in Keeping Trade Secrets ‘Secret’

As an employee, do you know what you should be doing to protect your company’s critical business information and trade secrets? It’s likely that in your employment contract you agreed not to disclose confidential corporate...more

Social Media Employee Privacy Laws – The New Majority Approach?

As the old Bob Dylan song goes, “the times they are a-changin’.” While I suspect his message may have been intended for a more meaningful topic than social media employee privacy laws, his words do ring true. When Maryland...more

255 Results
|
View per page
Page: of 11

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×