Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
CYBERSECURITY - Health Care Organizations Warned of Venus Ransomware - The Health Care Sector Cybersecurity Coordination Center (IC3) recently released an Analyst’s Note to health care organizations providing information...more
The Telephone Consumer Protection Act (TCPA), and the barrage of litigation that stems from its various interpretations, is always in the news. In fact, there is so much change that it’s often hard for a casual follower to...more
Last week, there were developments in two cases in different Pennsylvania courts involving employer liability—or lack thereof—for data breaches involving employee personally identifiable information (PII). A Pennsylvania...more
Identity theft through social networking is on the rise. Hacked accounts may be used to impersonate you and potentially cause reputational harm, or may even link the hacker to your financial account information and...more
Facebook users spend more time on the platform than they spend pursuing any other leisure activity, except TV. Indeed, 1/16th of the average user’s waking time is spent on the platform. The most disliked movie trailer in...more
Retail Tracking Update: Privacy Guidance Following Nomi Technologies - There is currently a widespread effort to quantify everything, from steps, to sleep, to batted ball exit velocity. Fifteen years ago, TV host Jeremy...more