Our latest six eDiscovery case law rulings MAY be our best ever! See what I did there? Our May 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses disputes related to prolonged lack of cooperation in...more
October was a busy month in New York for cybersecurity enforcement. In addition to a $4.5 million settlement between the New York Department of Financial Services and EyeMed Vision Care (discussed in a forthcoming blog post),...more
New York AG Letitia James warned that more than 1.1 million online accounts were compromised in cyberattacks known as “credential stuffing attacks” at 17 well-known companies and released a guide with recommendations for how...more
Pennsylvania recently became one of the last states to enact a law treating digital assets and electronic records as tangible property, which allows executors, trustees, guardians, and agents to access and manage the digital...more
According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more
Have you ever had the experience of attempting to register a social media account in the name of your business only to find that your preferred name is taken? Often, it’s just the case of another business with the same name...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
Information is everywhere, especially in the workplace. But traditional means of securing and sharing data—which typically involve accessing password protected information from various sources—is inefficient, cumbersome, and...more
On January 9, 2018, the Second Circuit (Kearse, Cabranes, Wesley) rejected a request by ex-AOL Inc. employee Jason Smathers to junk the restitution component of his sentence, which requires him to recompense the online...more
Verizon recently released its yearly Data Breach Investigations Report and as always, the report is a very informative read. The report gathered information from more than 64,000 security incidents worldwide in 2015, 2,260 of...more
Every morning we sit down at our computers and provide our credentials to the network; user name and password. It has become such a ubiquitous part of modern life, we have a user name and password to everything, we even have...more
With social media pervading all facets of society (no less than 67 percent of Americans are regular users), businesses have long been concerned with their employees’ potentially detrimental social media activities. As these...more
According to a recent report entitled Digital Trust in the IoT Era published by Accenture, 77% of consumers are interested in adopting alternatives to logging in by username and password. While companies using mobile...more
As social media and the numerous platforms continue their exponential growth in popularity and constant evolvement, legal issues surrounding their use also will inevitably emerge. A recent case filed in the Western District...more
Connecticut has joined a list of twenty-one states with a statute designed to preserve the privacy of personal online accounts of employees and limit the use of information related to such accounts in employment...more
On July 1, 2015, both Nevada and Wyoming’s breach notification law amendments come into force, expanding the definition of Personal Information (“PI”) to include account credentials such as a username or email address. With...more
As we have frequently reported in this blog, social media privacy issues increasingly permeate the workplace. For example, earlier this year, Montana and Virginia joined a growing number of states in enacting laws...more
Following a national trend, Montana and Virginia have become the nineteenth and twentieth states to enact laws restricting employer access to the social media accounts of applicants and employees. Virginia’s law, which...more
Effective July 1, 2015, employers in Virginia will have to comply with a new law limiting their access to employees’ and applicants’ social media accounts. The new law prohibits employers from requiring employees or...more
On April 8, 2014, Governor Scott Walker signed Wisconsin Act 208 to prohibit employers from requiring or requesting that prospective and current employees disclose usernames and passwords for their personal Internet accounts....more
As of January 1, security breach notifications must be provided to consumers when certain account information is compromised. On September 27, California Governor Jerry Brown signed into law Senate Bill No. 46 (S.B....more
On September 27, California Governor Brown once again signed into law a bill amending the state’s breach law (“S.B. 46”). This latest amendment is particularly significant because it represents the first major effort by a...more