Videocast: 2020 – The year of digital taxation
Government data mining leads to more aggressive investigations
Episode 23: Using “People Analytics” to Make Smart Business and Corporate Culture Decisions
Day 19 of One Month to More Effective Continuous Improvement-Use of Social Media for Continuous Improvement
BakerHostetler Partner Alan Friel Talks Big Data and Data Collection
PATIENT PRIVACY IN AN ERA OF SOCIAL MEDIA
After a data breach, organizations need to understand the scope of the incident in order to quickly resolve it and ensure they are able to meet notification requirements. The urgency often leads to the misguided belief that...more
AI emerges as both threat and solution in cyber insurance, reshaping risk assessment and breach response. AI is transforming the work of professionals everywhere. Unfortunately, that includes cybercriminals....more
Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more
For healthcare providers and health systems covered by the privacy and security regulations under the Health Insurance Portability and Accountability Act (HIPAA), a breach of unsecured protected health information (PHI)...more
In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more
Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more
Data mining has increasingly become one of the largest expenses during a cyber incident, often leaving claims professionals with blown budgets and insured clients in high-risk scenarios when assumptions about their data (and...more
Dealing with a cyber incident is an incredibly stressful time for clients and counsel. Not only is there the stress of dealing with the initial breach, but also the pressure to do a review of what data was compromised in...more
GM’s Monday announcement about cutting 14,000 North American jobs drew the ire of the White House yesterday, which threatened to “end federal tax credits” that have helped subsidize the company’s electric-vehicle fleet....more
Some reaction to the HQ2 x2 news, including what a pair of new tech hubs actually means for the cities that have thrown out the red carpet to Amazon and other technology giants....more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
We learned some important lessons this week about the dangers inherent to losing control of your customer or client data, either through hacking, internal theft, or poorly designed controls over what your business associates...more
In the 1969 film Butch Cassidy and the Sundance Kid, after Butch and Sundance rob Union Pacific Railroad (“Union Pacific”) the first time, Union Pacific employs a stronger safe. After Butch and Sundance rob Union Pacific a...more
Imagine a guy, a married guy, more specifically an unhappily married guy, and even more specifically an unhappily married guy lacking a moral compass. The guy creates a discrete (ha!) profile on AshleyMadison.com, a dating...more