It has been reported that a hacker was able to break into the servers of TheTruthSpy, a company that is described as “one of the most notorious stalkerware companies out there” (Motherboard, August 2018) and was able to steal...more
9/4/2018
/ Airspace ,
Arbitration ,
Biometric Information ,
Biometric Information Privacy Act ,
Blockchain ,
Commercial Use ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Do Not Call List ,
Drones ,
Emerging Technology Companies ,
Employee Privacy Rights ,
Employer Liability Issues ,
Employment Litigation ,
Federal Aviation Administration (FAA) ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Personally Identifiable Information ,
Popular ,
Safety Standards ,
Southwest Airlines ,
Unmanned Aircraft Systems
Information is every organization’s greatest asset. It makes up intellectual property, trade secrets and many other vital corporate assets. It’s how we in corporate America conduct business. With that said, governing and...more
After the terrorist attack in Orlando, Florida, early this month, the Electronic Communications Privacy Act (ECPA) has been discussed quite a bit. The ECPA, a law which took effect in 1986, limits the government’s access to...more
6/21/2016
/ Data Privacy ,
Digital Communications ,
ECPA ,
Electronic Communications ,
Electronically Stored Information ,
FBI ,
Hate Crimes ,
Invasion of Privacy ,
Mass Shootings ,
National Security Letters (NSLs) ,
Popular ,
Terrorist Acts
An annual audit conducted by the U.S. Government Accountability Office of the Fiscal Service Bureau, identified (9) nine new information security weaknesses in the U.S. Treasury Department’s information systems that are used...more