News & Analysis as of

Sensitive Personal Information Malware

Foley & Lardner LLP

Cybersecurity in the Age of Industry 4.0 - Part 1

Foley & Lardner LLP on

As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more

Cozen O'Connor

Arkansas AG Alleges Temu Uses E-Commerce App for Unlawful Data Access

Cozen O'Connor on

Arkansas AG Tim Griffin has filed a lawsuit against PDD Holdings Inc. and WhaleCo Inc., d/b/a Temu, alleging that Temu’s popular online shopping app operates as malware that is designed to gain unauthorized access to users’...more

Array

This Week in eDiscovery: Discovery Requests of Private Email and Social Media Accounts, Plus, Microsoft Unveils “Air Gapped” LLM

Array on

Courts Rule for Private Email and Social Media Discovery - In two separate recent rulings, courts granted discovery related to private email accounts and private social media account usernames in requests made by...more

Genova Burns LLC

Potential Harm Enough For Class Action to Proceed in Data Breach Litigation

Genova Burns LLC on

The Third Circuit Court of Appeals has given new life to a putative class action suit led by a former employee of a company that suffered a ransomware attack, leading to her sensitive information being released onto the Dark...more

Lowenstein Sandler LLP

Contradictory Responses by Privacy Regulators Post-COVID-19: Balancing the Economy With Cybersecurity in a Changed World (Privacy)

The COVID-19 pandemic has had a disparate effect on privacy regulators, with varying levels of enforcement advocated by different government entities; the California Attorney General, the U.S. Department of Health & Human...more

K2 Integrity

Tailgating – How to Avoid Physical Security Breaches

K2 Integrity on

Tailgating is a physical security breach in which an unauthorized person gains access to a building or other protected area, usually by waiting for an authorized user to open and pass through a secure entry and then following...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide