Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Kaiser Permanente is notifying 13.4 million current and former members that their personal information may have been compromised when it was transmitted to tech giants Google, Microsoft Bing and X (formerly Twitter) when...more
Today’s mobile workforce means that many employees blend their personal and professional lives on the same devices, possibly putting organizations’ data at risk. During the holiday season, in the search for gifts, low prices,...more
Yesterday’s sole topic for the monthly public Federal Trade Commission (FTC) meeting was identity theft. That’s it. No policy statements, no votes, no repeal of carefully crafted bipartisan policy documents, just identity...more
Biometric privacy litigation has exploded in the last several years, with the current hot spot focus in Illinois. Class actions under the Illinois Biometric Information and Privacy Act (“BIPA”) have flooded the Illinois state...more
I have done more online shopping this year than ever before, and I know that I am not alone. With the holidays approaching, this will only increase because of the pandemic, and hackers and fraudsters know it....more
The past few months have been hard on many people and businesses. Some of us may even know individuals who lost their job due to the pandemic. Unfortunately, there are always those who prey on the misfortunate...more
A few weeks ago, Texas signed into law an amendment to its data breach law, capping off a busy first half of 2019 for state lawmakers in this arena. As we gear up for the second half of 2019, we thought a recap was...more
Heard any good lawyer jokes lately? Having been in practice for almost 25 years, I've heard quite a few from friends and clients. How about, "What's the difference between a vulture and a lawyer? . .. The vulture doesn't get...more
A comprehensive review of recent Federal Trade Commission (FTC or Commission) consumer protection actions shows that the FTC continues to be one of Washington’s most aggressive regulators. While the number of enforcement...more
Identity Theft in the Digital and Physical Worlds - Common sense is the best defense against identity theft – creating strong passwords for online accounts and monitoring personal credit reports and credit card statements...more
The Federal Trade Commission (FTC) has announced updates to the IdentityTheft.govwebsite aimed at making the site more useful to victims of identity theft. The changes will enable consumers to quickly file complaints and...more
Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more
The News Journal article highlighted passage by the Delaware legislature in 2014 of House Bill 295, now codified as 6 Del. C. §5001C et seq.: Safe Destruction of Records Containing Personal Identifying Information. Much of...more
In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more
sing it with me now…. Five Golden Rules…….(well, five new privacy laws/requirements) There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more