Latest Publications

Share:

Taxpayer Cybersecurity – Step 5: Create a Data Theft Recovery Plan

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Taxpayer Cybersecurity – Step 4: Recognize Identity Theft

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Taxpayer Cybersecurity – Step 3: Avoid E-mail Phishing Scams

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Taxpayer CyberSecurity — Step 2: Create A Data Security Plan

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Taxpayer CyberSecurity — Step 1: Protect Your Systems!

In March 2015, the Internal Revenue Service (“IRS”) convened an unprecedented coalition of state tax agencies and private-sector tax industry officials to fight back against emerging criminal syndicates exploiting sensitive...more

Facing the Issue: San Francisco Bans City Use of Facial Recognition Technology

On May 21, 2019, the City of San Francisco passed an ordinance banning the use of facial recognition software by police and other city agencies. The San Francisco Board of Supervisors voted 8-1 in favor of the ban, which went...more

What Does the New Utah Electronic Data Privacy Law Do?

Utah recently became the first state to enact a law specifically designed to protect private electronic information stored with third parties from collection by law enforcement without a valid warrant. Utah Governor Gary...more

The Anatomy of an FTC Data Security Lawsuit

The Federal Trade Commission (“FTC”) has described itself as “Your cop on the privacy beat” and a top federal regulator of consumer-facing data security practices. An example of how the FTC asserts itself when it comes to...more

Arizona Holds No Duty by Manufacturer in Secondary Asbestos Exposure Case

The Arizona Supreme Court recently held that a defendant that used asbestos materials in its workplace before 1970 has no duty to protect the public from secondary asbestos exposure. Arizona only recognizes a duty in a...more

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Supreme Court: Warrant Usually Required For Cell Tower Records to Track a Person’s Movements

On June 22, 2018, the United States Supreme Court ruled in a 5-4 decision that the government generally needs a search warrant to track a person’s location through cell phone location records. The opinion, in Carpenter v....more

Celebrate National Tax Security Awareness Week!

While it may be better known as “Cyber Monday”, today also marks the start of the second annual National Tax Security Awareness Week (November 27 to December 1). The Internal Revenue Service, state tax agencies and the tax...more

Happy Cybersecurity Awareness Month! Are you Safe?

Since it was first announced by Presidential Proclamation in 2013, we mark each October as National Cybersecurity Awareness Month. The Department of Homeland Security explains that, in 2017, designation is “designed to engage...more

WannaCry: What to Know and What to Do

On Friday, May 12, 2017, a malicious ransomware program known as WannaCry was discovered infecting computer systems all over the world. It set off alarms globally, and so far has infected over 200,000 computers across more...more

Notable New State Privacy and Data Security Laws – Part Two

This is the second in a two-part series addressing recent developments in state privacy and data security laws. This article addresses new laws about student privacy, enforcement/ punishment for data privacy and security...more

Data Privacy Day? Yep, it’s a Thing.

For a number of years now, January 28 has been marked as “Data Privacy Day” (or, for our European friends, “Data Protection Day”), and it is often overlooked observed in the United States, Canada, India and many European...more

NIST Issues Draft Update to the Cybersecurity Framework

On January 10, 2017, as the Obama administration draws to a close, the National Institute of Standards and Technology (“NIST”) released a long-awaited draft version 1.1 of its ground-breaking Framework for Improving Critical...more

FTC Releases a Data Breach Response Guide For Business

Data breaches are fast becoming a fact of life. Experiencing a data breach is never a pleasant experience, regardless of how it happens – by accident, by criminal intent, or by system failure. Someone steals a company...more

Commerce Secretary: Trust Gap Hinders Cyber Attack Reporting

In a keynote address delivered on September 27, 2016 at the U.S. Chamber of Commerce’s fifth annual Cybersecurity Summit in Washington, DC, Commerce Department Secretary Penny Pritzker conceded that “the federal government...more

Privacy Tip: Cover Your Computer Camera and Microphone

Someone may be using your laptop or your desktop web camera to watch and listen to you without your knowledge. It happens, and yes, it’s downright creepy. And to think that someone may be spying on your kids that way is...more

Congress Releases Unclassified Summary on Snowden/NSA Leak

On September 15, 2016, the House of Representatives’ Intelligence Committee released its summary findings of a two-year investigation concerning the unauthorized disclosures made by former National Security Agency (NSA)...more

The FTC Rules Against LabMD in On-Going Data Security Case

The lengthy saga between the Federal Trade Commission (FTC) and LabMD, Inc. reached another turning point on July 28, 2016. The FTC issued its unanimous Opinion in which it found that LabMD’s data security practices were...more

HIPAA News: HHS Getting Tough On ePHI Data Breaches

On August 4, 2016, the U.S. Department of Health and Human Services, Office of Civil Rights (OCR) announced a record-setting settlement with Advocate Health Care Network (Advocate) for multiple potential violations of HIPAA...more

Ransomware Attacks on ePHI May Be a Data Breach Under HIPAA

On July 11, 2016, the Office of Civil Rights (“OCR”) at the Department of Health and Human Services issued new HIPAA guidance regarding the growing epidemic of malicious computer software known as “ransomware”....more

Beware of Emerging Cyber Scams – Part 1: Business Email Compromise

This is the first in a series of articles about increasingly sophisticated cyber scams, and follows several alerts issued by the FBI’s Internet Crime Complaint Center (IC3). These scams include: (1) Business Email...more

61 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide