The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/27/2019
/ Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Theft ,
Hackers ,
Identity Theft ,
IRS ,
Personally Identifiable Information ,
Popular ,
State Taxes ,
Tax Returns
The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/15/2019
/ Cyber Crimes ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
Income Taxes ,
IRS ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Social Security Numbers ,
Tax Planning ,
Tax Returns
The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/9/2019
/ Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
Identity Theft ,
Information Security ,
IRS ,
Personally Identifiable Information ,
Popular ,
Tax Planning
On May 21, 2019, the City of San Francisco passed an ordinance banning the use of facial recognition software by police and other city agencies. The San Francisco Board of Supervisors voted 8-1 in favor of the ban, which went...more
7/15/2019
/ Airports ,
Biometric Information ,
City Agencies ,
Civil Liberties ,
Data Collection ,
Data Privacy ,
Facial Recognition Technology ,
Law Enforcement ,
Local Ordinance ,
Personally Identifiable Information ,
Police ,
Public Transit ,
Racial Bias ,
Software
While it may be better known as “Cyber Monday”, today also marks the start of the second annual National Tax Security Awareness Week (November 27 to December 1). The Internal Revenue Service, state tax agencies and the tax...more
11/27/2017
/ Cyber Attacks ,
Cybersecurity ,
Cybersecurity Summit ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
IRS ,
Personally Identifiable Information ,
Phishing Scams ,
W-2
Since it was first announced by Presidential Proclamation in 2013, we mark each October as National Cybersecurity Awareness Month. The Department of Homeland Security explains that, in 2017, designation is “designed to engage...more
For a number of years now, January 28 has been marked as “Data Privacy Day” (or, for our European friends, “Data Protection Day”), and it is often overlooked observed in the United States, Canada, India and many European...more
1/30/2017
/ Computer Virus Protection ,
Credit Cards ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Debit Cards ,
Encryption ,
EU ,
Online Banking ,
Passwords ,
Personally Identifiable Information ,
Privacy Concerns ,
Privacy Settings ,
Software ,
US-CERT
Data breaches are fast becoming a fact of life. Experiencing a data breach is never a pleasant experience, regardless of how it happens – by accident, by criminal intent, or by system failure. Someone steals a company...more
On August 4, 2016, the U.S. Department of Health and Human Services, Office of Civil Rights (OCR) announced a record-setting settlement with Advocate Health Care Network (Advocate) for multiple potential violations of HIPAA...more
8/8/2016
/ Business Associates ,
Corrective Actions ,
Data Breach ,
Data Security ,
Department of Health and Human Services (HHS) ,
Encryption ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
HIPAA Audits ,
HIPAA Breach ,
OCR ,
Personally Identifiable Information ,
PHI
Utah, like most U.S. states, has enacted laws concerning data security and steps to take when a data breach occurs. Here is what Utah law provides as codified in Utah Code Ann §§ 13–44–101 et seq. The law has been in effect...more
I. Executive Summary -
The Treasury Department and the IRS are sensitive to the data security problems facing organizations, their employees and their customers and, as a result, have provided some welcomed...more
Earlier this month, the California Attorney General’s Office released the 2016 Data Breach Report covering years 2012 through 2015 for the State of California (the “AG’s Report”). The AG’s Report reveals that 557 data...more
Last spring we posted a summary of Nevada’s data security laws. Since then, during the 2015 legislative session, the Nevada legislature adopted certain amendments to the statute. The changes took effect on July 1, 2015....more
On July 20, 2015, a federal appeals court in Chicago issued what could be a watershed ruling in favor of consumers pursuing class action lawsuits against retailers and other companies following data breaches that involve the...more
7/23/2015
/ Appeals ,
Clapper v. Amnesty International ,
Class Action ,
Corporate Counsel ,
Data Breach ,
Debit and Credit Card Transactions ,
Imminent Harm ,
Injury-in-Fact ,
Neiman Marcus ,
Personally Identifiable Information ,
Popular ,
Retailers ,
Reversal
Like other federal agencies exercising regulatory power in the data privacy and security arena, the Financial Industry Regulatory Authority (“FINRA”) is cracking down on firms that fail to meet required data security...more
In Part 1, we covered some basic privacy policy concepts. Here in Part 2, we address three problems associated with privacy policies in practice.
1. You Don’t Have One, But You Really Should -
There is no...more
A privacy policy is a key legal document in this new era of Big/Data/Breaches. When distilled to its essence, a privacy policy is simply “say what you do, and do what you say” with others’ personal information. A growing...more
Companies that are looking to sell, transfer or buy personally identifiable information (“PII”) via bankruptcy asset sales would be wise to confirm that such a transfer is consistent with the debtor’s privacy policy. If it...more