Passwords

News & Analysis as of

Friend (or Foe) Requests: Using Social Media In Employment Litigation

Seyfarth Synopsis: Social media is a potential goldmine of information when it comes to defending against employment lawsuits—pictures, status updates, location markers, “likes,” groups, and associated friends, all from the...more

Privacy Tip #59 – Check your Privacy Settings on Your LinkedIn Account

I am watching Game 7 of the World Series, and it is the bottom of the 8th and the score is 6-6. It is very difficult to concentrate on this blog post. So I am taking the easy way out and reminding you to check the...more

A Selfie’s Worth a Thousand Dollars

A picture might be worth a thousand words, but could it also be worth a thousand dollars? New technology by MasterCard and Amazon may mean that the new hammock you’ve been eying online is only a camera flash away....more

Latest Cyber Attack a Wake-up Call: What are your company’s IoT exposures?

The Internet of Things gives rise to many risks and exposures that companies and their insurers were not thinking about as recently as a couple years ago, and probably aren’t fully cognizant of today....more

Privacy Tip #56 – Be Careful Before You Link Your Home Appliance to Your Smartphone and Change Your Passwords Now

Last week, Brian Krebs reported that hackers using a malware dubbed “Marai” have identified hundreds of thousands of home and office devices that have weak security. Then the hackers released the malware publicly so anyone...more

Judge Approves LifeLock’s $68M Proposed Settlement with Class and $10.2M with Lawyers

On Tuesday, September 20, 2016, a federal judge in California granted approval of the $68 million settlement between LifeLock and a class of plaintiffs that alleged it made false statements about the services it provides to...more

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

New Law Deals With Digital Assets After Death

In an article earlier this year we noted that at a large number of states had introduced legislation to address an emerging issue that is unique to our Information Age: how will our digital assets be accessed and used (or...more

Three Actions to Take If You Are a Victim Of Identity Theft

You may be a victim of identity theft and not even realize it. Have you received a letter from a bank you do not recognize confirming that your new line of credit has been approved? Or maybe a phone call from a credit card...more

Hardware Password Defaults – Do You Change Them?

IT professionals have long understood the importance of changing the default password for network connected hardware devices (printers, switches, wireless access points, etc.). In the world of the Internet Of Things it seems...more

Dropbox Hacking from 2012 Actually Affected 68 Million Users

It was well known in 2012 that Dropbox suffered a data breach when its user names and passwords were compromised. But at the time, Dropbox did not admit the breadth of the compromise. Last week, they admitted that 68 million...more

Lightspeed Urges Customers to Change Passwords Following Data Breach

Lightspeed, a retail point-of-sale company that provides cloud-based services to 38,000 clients, has reported that its central database, which stores client information on sales, products, encrypted passwords, and in some...more

Redefining U.S. Export Controls: Takeaways from Key Changes Effective September 1st

On September 1, 2016 new rules previously published by the U.S. Department of Commerce, Bureau of Industry and Security (BIS)1 and the U.S. Department of State, Directorate of Defense Trade Controls (DDTC)2 will become...more

Dropbox.com: Change Passwords Immediately

You and your business may use the cloud vendor Dropbox (www.dropbox.com) to store or transfer files, work-related documents, or personal information (or may have used it to transfer such data in the past). ...more

The Florida Fiduciary Access to Digital Assets Act

When Justin Ellsworth was killed in Iraq in 2005, his family requested that Yahoo grant them access to Justin’s Yahoo e-mail account. Yahoo refused, forcing Justin’s family to sue Yahoo to gain access. Ultimately, the...more

Privacy Tip #49 – Use a Passphrase Instead of a Password

I love to train employees on data privacy and security. It tends to be rather entertaining as I can tell crazy stories about real life scenarios about data breaches or compromises. The stores are quite beneficial, as most...more

Password (Sharing) Risks Persist for Fiduciaries and Family Members

In May, I posted about “Estate Planning in the Digital Age” and mentioned the practical limitations of shared passwords as a means of digital estate planning.  Recent cases suggest that relying only on password sharing, even...more

Sharing of Passwords Under Certain Circumstances Unlawful

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

Best Practices to Thwart Hackers Using Email to Get Your Money

Not a week goes by without some news report of another hacking incident. The industries targeted include large retail stores, restaurants, banks, attorneys, accountants and recently in Maryland, a title company. In...more

Oracle’s MICROS Point of Sale Division Hacked

KrebsonSecurity has reported that the Russian organized cybercrime group dubbed the Carbanak Gang, which in the past has been suspected of stealing more than $1 billion from banks, retailers and hotels and restaurants...more

LastPass Security Vulnerabilities Discovered

Passwords have always been a challenge. It is hard to remember them, and you are not supposed to use the same password across different platforms. Several companies, including LastPass, have tried to help consumers with...more

Ninth Circuit Rules on Meaning of “Without Authorization” under Computer Fraud and Abuse Act

Last month, the Ninth Circuit affirmed the criminal conviction of an individual for accessing a computer “without authorization” in violation of the Computer Fraud and Abuse Act (“CFAA”). U.S. v. Nosal (9th Cir., July 5,...more

Business Litigation Alert: "Business Lessons from the Database Hack of the Houston Astros"

Christopher Correa, a former scout for the St. Louis Cardinals, was recently sentenced to almost four years in prison for hacking the Houston Astros player-personnel database. While it seems far-fetched that hacking would...more

What Can Go Wrong When You Offer Public Internet Access

By providing public internet access, a business owner may find that he or she is responsible for activity conducted by patrons who use that access. While this area of law is still very much unsettled, a business owner may be...more

Déjà Vu Not All Over Again: Ninth Circuit Strengthens CFAA In Nosal II

On July 5, 2016, the Ninth Circuit Court of Appeals issued its highly anticipated decision in the most recent chapter of United States v. Nosal, holding that an individual acts "without authorization" as used in the Computer...more

299 Results
|
View per page
Page: of 12
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×