Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Law firms are one of the most attractive targets for cybercriminals, making strong cybersecurity a critical concern for these organizations. With confidential client information, sensitive legal documents, and valuable...more
Live adult streaming website CAM4 has reportedly not secured 7TB of users’ information, which may be able to be used for blackmail and identity theft purposes, according to researchers from Safety Detectives....more
In a case that reads like an episode of “Dallas,” the Texas Supreme Court reiterated the rules for recovery of punitive damages. Bennett v. Grant, No. 15-0338 (April 28, 2017)....more