Companies storing or moving large quantities of digital information routinely receive subpoenas, court orders and warrants from United States law enforcement seeking subscriber information and related data and records....more
Criminal masterminds are constantly re-envisioning their weapon of choice. International cyberattacks perpetuated through the use of leaked nation-state cyber tools, shaped many security discussions in 2018, but a new year...more
2/14/2019
/ Board of Directors ,
California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Email ,
General Data Protection Regulation (GDPR) ,
Personally Identifiable Information ,
Popular ,
Securities and Exchange Commission (SEC) ,
Smartphones
On August 2, 2018, the Federal Bureau of Investigation (FBI) issued a Public Service Announcement about hackers’ misuse of Internet of Things (IoT) devices....more
On June 22, 2018, the United States Supreme Court appeared to establish a new standard for privacy rights when its decision in Carpenter v. United States, 2018 BL 222220 (2018), held that the government’s acquisition of a...more
7/11/2018
/ Carpenter v US ,
Cell Phones ,
Cell Site Location Information (CSLI) ,
Criminal Convictions ,
Electronic Records ,
Electronically Stored Information ,
Exigent Circumstances ,
Fourth Amendment ,
Geolocation ,
Location Data ,
Probable Cause ,
Reasonable Expectation of Privacy ,
Remand ,
Reversal ,
SCOTUS ,
Third-Party ,
Warrantless Searches
On February 21, 2018, the Securities and Exchange Commission (SEC) “voted unanimously to approve a statement and interpretive guidance to assist public companies in preparing disclosures about cybersecurity risks and...more
On June 25, 2018, the New York Department of Financial Services (“NYDFS”) issued a final regulation (the “Regulation”) requiring consumer reporting agencies with “significant operations” in New York to (1) register with NYDFS...more
On June 11, 2018, Deputy Assistant Attorney General Adam Hickey testified to the Senate Judiciary Committee about “foreign influence operations, which include cyber efforts to interfere in our elections. As stated by Hickey,...more