Location data is data that marks the longitude/latitude location of a smartphone or other device at a particular time, or over a period of time. It works like this: each day our device, which has a unique identifier or ID,...more
On the heels of the ransomware that had the City of Atlanta scrambling last week, New York City Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of...more
4/10/2018
/ Blockchain ,
Cambridge Analytica ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electric Vehicles ,
Electronically Stored Information ,
Facebook ,
Legislative Agendas ,
New Legislation ,
Part 107 ,
Personal Data ,
Proposed Legislation ,
Ransomware ,
Social Media ,
State Data Breach Notification Statutes ,
Taxi Cabs ,
US v Microsoft
On March 30, 2018 Solicitor General Noel J. Francisco filed a motion with the U.S. Supreme Court in United States v. Microsoft Corporation that seeks to vacate the judgment of the U.S. Court of Appeals for the Second Circuit...more
4/5/2018
/ Cloud Storage ,
Criminal Investigations ,
e-Discovery Professionals ,
Electronically Stored Information ,
Extraterritoriality Rules ,
International Litigation ,
Ireland ,
Legislative Agendas ,
Personally Identifiable Information ,
Proposed Legislation ,
Right to Privacy ,
SCOTUS ,
Search Warrant ,
Stored Communications Act ,
Subpoenas ,
US v Microsoft
Power Company Fined for Contractor Copying Data to its Own Insecure Network -
Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more
3/30/2018
/ Asset Management ,
Cloud Storage ,
Cybersecurity ,
Data Breach ,
Driverless Cars ,
Drones ,
Electronically Stored Information ,
Energy Sector ,
Federal Aviation Administration (FAA) ,
FERC ,
Fraud ,
Identity Theft ,
Infrastructure ,
NERC ,
NIST ,
Part 107 ,
Popular ,
Social Security ,
State Data Breach Notification Statutes ,
Third-Party Service Provider ,
Unmanned Aircraft Systems ,
Utilities Sector ,
Vulnerability Assessments
On March 23, 2018, the President signed into law the Consolidated Appropriations Act of 2018 (H.R. 1625), an omnibus spending bill that includes the Clarifying Lawful Overseas Use of Data Act (the CLOUD Act)....more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
10/24/2017
/ Amazon Marketplace ,
Biometric Information ,
Biometric Information Privacy Act ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Drones ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Hackers ,
Hyatt ,
Microsoft ,
Mobile Devices ,
Network Security ,
Personal Data ,
Privacy Concerns ,
Public Wireless Networks ,
Risk Management ,
SCOTUS ,
Stored Communications Act ,
US-CERT ,
Vulnerability Assessments ,
Wifi ,
Wireless Technology
In an order issued on October 16, 2017, the U.S. Supreme Court granted certiorari in United States v. Microsoft Corporation, a case with potentially far-reaching implications for the privacy of electronic data maintained by...more
10/20/2017
/ Certiorari ,
Criminal Investigations ,
Drug Trafficking ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Internet Service Providers (ISPs) ,
Ireland ,
Microsoft ,
Popular ,
Search Warrant ,
Stored Communications Act ,
Subpoenas
Canada’s Personal Information Protection and Electronic Documents Act (“PIPEDA”) has been amended by The Digital Privacy Act (the “DPA”). DPA updates PIPEDA and modernizes Canadian data privacy and security law. DPA is now...more
8/21/2015
/ Breach Notification Rule ,
Canada ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
DPA ,
Electronically Stored Information ,
Personally Identifiable Information ,
PIPEDA ,
Prior Express Consent ,
Privacy Laws