We are increasingly seeing situations in which a client’s information systems are breached by an ethical hacker. Typically, they take a screen shot or two of data to prove their accomplishment, carefully redact any...more
11/4/2019
/ Bug Bounty Program ,
Confidential Information ,
Data Breach ,
Data Subjects Rights ,
Enforcement Actions ,
Ethics ,
Extortion ,
Federal Trade Commission (FTC) ,
Hackers ,
Information Management ,
Information Technology ,
Personal Information ,
Risk Management ,
State Data Breach Notification Statutes ,
Uber
From big cities and small cities to school districts and beach towns, more than 40 municipalities have been the victim of a cyberattack this year. The New York Times described the season that ended on Monday as a “summer of...more
9/6/2019
/ Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Department of Homeland Security (DHS) ,
Educational Institutions ,
Hackers ,
Municipalities ,
Public Schools ,
Ransomware ,
Risk Mitigation ,
School Districts
Last week, Governor Cuomo signed the SHIELD Act into law. As a result, organizations that maintain private information concerning New York state residents will have to develop compliance programs before the law becomes...more
Wire fraud is on the rise. Health care providers engaging in transactions, whether operational or financial, need to remain aware of crimes involving compromised emails and fraudulent wire transfers....more
6/24/2019
/ Banks ,
Best Practices ,
Corporate Counsel ,
Cyber Incident Reporting ,
Cybersecurity ,
FBI ,
Financial Crimes ,
Health Care Providers ,
Notice Requirements ,
Popular ,
Risk Management ,
Supporting Documentation ,
Wire Fraud