Dow Jones & Co. Has notified 3500 of its customers that their information has been accessed by unauthorized individual in a data breach that spanned August of 2012 through July of 2015.
The unauthorized access, through...more
True to his word, the Connecticut AG has aggressively entered the data privacy and security enforcement arena with a $90,000 settlement with Hartford Hospital and EMC.
The AG has agreed to a payment of $90,000 from...more
Have you ever noticed how much of your personal information is included on a prescription bottle and its packaging? Take a look next time you pick up a prescription at the pharmacy. The outer packaging may include your name,...more
In what had been touted as the first data security enforcement action with a cable operator, the Federal Communications Commission (FCC) has agreed to settle an enforcement action following a data breach with Cox...more
We previously reported that the Federal Trade Commission (FTC) had filed suit against LifeLock alleging that it had violated a previous settlement with the FTC regarding false advertising and was in contempt....more
Not-for-profit mental health center Emergence Health Network, located in El Paso, Texas, has announced that its computer servers were compromised “through an unauthorized internet connection” from as far back as 2012....more
It is scary to read the headlines that kids become victims of crimes, some of them horrific, because of online activity. Kids are naive and susceptible to online predators. Parents must be vigilant in educating their children...more
On Friday, October 30, the Securities and Exchange Commission (SEC), by a vote of 3-1, adopted rules designed to implement a 2012 law that allows startups to use crowdfunding to generate investments in their companies....more
I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more
A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more
11/2/2015
/ Capital One ,
Class Action ,
Credit Cards ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
Mobile Apps ,
Personally Identifiable Information ,
Sharing Economy ,
Social Security Numbers ,
Transportation Industry ,
Uber
The National Cybersecurity Center of Excellence, in partnership with the National Strategy for Trusted Identities in Cyberspace National Program Office, have launched a project designed to embed privacy and security measures...more
After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015.
The bill has been touted as being controversial and is opposed by...more
11/2/2015
/ Chamber of Commerce ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Privacy ,
Data Protection ,
Data Security ,
Data-Sharing ,
Hackers ,
Information Sharing ,
Obama Administration ,
Pending Legislation ,
Personal Data ,
Popular ,
Privacy Concerns ,
Privacy Laws ,
Security and Privacy Controls
The National Cybersecurity Center of Excellence is seeking comments on a draft practice guide, entitled “IT Asset Management (Special Publication 1800-5a)” which is “designed to help the financial services industry monitor...more
We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more
10/30/2015
/ Banking Sector ,
Banks ,
Criminal Investigations ,
Criminal Prosecution ,
Cyber Attacks ,
Cyber Crimes ,
Data Breach ,
Data Theft ,
Department of Justice (DOJ) ,
Extradition ,
Federal Employees ,
Financial Institutions ,
Hackers ,
Identity Theft ,
Malware ,
Military Service Members ,
Personally Identifiable Information ,
Twitter ,
Ukraine ,
Wire Fraud
Last week, the Vienna Higher Regional Court ruled that most of Max Schrems’ claims against Facebook can proceed, including his claim that Facebook improperly allowed his personal information to be shared with the National...more
10/30/2015
/ Austria ,
Binding Corporate Rules ,
Class Action ,
Cybersecurity ,
Data Protection Authority ,
EU Data Protection Laws ,
European Commission ,
European Court of Justice (ECJ) ,
Facebook ,
Federal Trade Commission (FTC) ,
International Data Transfers ,
Ireland ,
National Security ,
National Security Agency (NSA) ,
Personal Data ,
Privacy Laws ,
Right to Privacy ,
Safe Harbors ,
safe-h ,
Schrems I & Schrems II ,
US-EU Safe Harbor Framework
For your convenience, a short list of JD Supra writers covering the myriad issues raised surrounding Cybersecurity, date privacy and protection, and related matters. ...more
I have spent some time over the past few weeks concentrating on steps individuals can take to protect their privacy and identity. But how do you protect your child’s identity?...more
10/23/2015
/ Anthem Blue Cross ,
Child Protection Laws ,
Child Safety ,
Credit Reports ,
Data Breach ,
Data Privacy ,
Identity Fraud ,
Identity Theft ,
IRS ,
Online Safety for Children ,
Personally Identifiable Information ,
Privacy Concerns ,
Social Security Numbers
Many retail pharmacies, supermarkets and other retailers offer rewards cards that offer discounts on certain items to be purchased in the store. They give you the cards that contain a bar code in regular size, which looks...more
We continue to urge CEOs and boards of public companies (and private and not-for profits) to harken the call of getting a handle on cybersecurity risk to companies today. Not too soon, the New York Stock Exchange published a...more
10/23/2015
/ Best Practices ,
Board of Directors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Incident Reporting ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Security ,
Incident Response Plans ,
Nonprofits ,
NYSE ,
Publicly-Traded Companies ,
Trade Secrets
The Department of Energy (DOE) has announced that it will invest $34M to the University of Arkansas and the University of Illinois for two projects designed to “improve and enhance” the protection of the U.S. electric grid,...more
We have been reporting on the success of the Department of Justice in combatting cybercrime through prosecutions of hackers. But we never expected this. Following Chinese President Xi’s visit to the U.S., and for the first...more
A lot has happened since the European Court of Justice’s declaration that the EU-US safe harbor framework is invalid.
First, the Article 29 Working Party, an organization comprised of representatives from each data...more
10/23/2015
/ Article 29 Working Group ,
Cybersecurity ,
Data Protection Authority ,
Edward Snowden ,
EU Data Protection Laws ,
European Commission ,
European Court of Justice (ECJ) ,
Facebook ,
Federal Trade Commission (FTC) ,
International Data Transfers ,
Ireland ,
Judicial Redress Act ,
National Security ,
National Security Agency (NSA) ,
Personal Data ,
Privacy Laws ,
Right to Privacy ,
Safe Harbors ,
Schrems I & Schrems II ,
US-EU Safe Harbor Framework
An anonymous hacker has contacted the New York Post to explain how he was able to hack into the CIA Director’s AOL email account. According to several reports, a high school student and his two friends implemented social...more
10/23/2015
/ AOL ,
Criminal Investigations ,
Cyber Attacks ,
Cyber Crimes ,
Data Breach ,
Data Privacy ,
Email ,
FBI ,
Hackers ,
Telecommunications ,
Twitter
Sony Pictures (Sony) agreed on Monday (October 19, 2015) to pay at least $2M and up to $4.5M to employees whose personal information was breached and posted online during the massive hack that hit Sony in 2014....more
American Thrift Stores announced this week that like other retailers, it has been hit with a security breach “that occurred through software used by a third-party service provider” that allowed “criminals from Easter Europe”...more
10/16/2015
/ Credit Cards ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Debit Cards ,
Hackers ,
Identity Theft ,
Malware ,
Retail Market ,
Retailers ,
Secret Service ,
Third-Party Service Provider