News & Analysis as of

Passwords Data Protection Personal Data

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #430 – GrubHub Confirms Security Incident Through Third Party Vendor

If you are a GrubHub customer, read carefully. The app has confirmed a security incident involving a third-party vendor that allowed an unauthorized threat actor to access user contact information, including some customer...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 9, November 2024

Welcome to our ninth 2024 issue of Decoded - our technology law insights e-newsletter. How are States Using Generative Artificial Intelligence? and Employee AI Adoption Cools Globally - Why this is important: As...more

Baker Donelson

I Can Hear Your Passwords

Baker Donelson on

On August 3, British researchers published an Institute of Electrical and Electronics Engineers (IEEE) article explaining how the sounds of typing on a laptop keyboard can be heard and that deep learning can be used to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2022

Robinson & Cole LLP on

CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2019 #2

Robinson & Cole LLP on

The Ecuadorian Ministry of Telecommunications and Information Security has announced an investigation into data analytics company Novaestrat after news broke this week that the company left an Elasticsearch server open...more

Robinson+Cole Data Privacy + Security Insider

UK Information Commissioner’s Office Issues Guidance on Use of Encryption and Passwords in Connection with GDPR

The “security principle” under the General Data Protection Regulation (GDPR) requires that organizations process personal data securely by means of “appropriate” technical and organizational measures....more

Morgan Lewis

United Kingdom Establishes IoT Security Principles

Morgan Lewis on

The UK government recently released a policy paper outlining proposed requirements for makers of Internet of Things (IoT) devices to take certain actions to better protect IoT devices from growing cybersecurity threats....more

Morgan Lewis

Three States Join Others to Expand Personal Information Definition to Include Usernames or Email Addresses

Morgan Lewis on

Businesses should take steps to protect usernames, email addresses, passwords, and security questions and answers. A key issue in determining whether notification is required following a data breach is whether...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide