News & Analysis as of

Unauthorized Access Cybersecurity

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Troutman Pepper

Caregivers in Cybersecurity — Unauthorized Access Podcast

Troutman Pepper on

Unauthorized Access, our privacy and cybersecurity-focused podcast, spotlights the human side of the cybersecurity industry. In this episode, Sadia welcomes Sherri Davidoff, CEO of LMG Security, to discuss the challenges and...more

Troutman Pepper

Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast

Troutman Pepper on

Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more

Troutman Pepper

Ross Is Boss — Unauthorized Access Podcast

Troutman Pepper on

Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing. In...more

Troutman Pepper

Unauthorized Access Returns With "Get to Know Joe" — Unauthorized Access Podcast

Troutman Pepper on

It’s official! The Unauthorized Access podcast has returned, now with a slightly different spin. Our monthly podcast will spotlight the human aspect of cybersecurity, bringing you closer to the remarkable personalities...more

Constangy, Brooks, Smith & Prophete, LLP

FTC Non-Banking Financial Institutions Safeguards Rule

The Federal Trade Commission has approved an amendment to the Safeguards Rule under the Gramm-Leach-Bliley Act that creates a new data privacy regulatory reporting requirement for non-banking financial entities. Covered...more

Troutman Pepper

Panel Pursuit: The Ins and Outs of Becoming a Preferred Panel Vendor - Unauthorized Access Podcast

Troutman Pepper on

In this episode of Unauthorized Access, Kamran Salour and Sadia Mirza welcome Assistant Vice President of Cyber Services and Incident Response Linda Comerford of AmTrust. During this discussion, Linda navigates the steps of...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

DOJ Clarifies Policy for Prosecutions Under the Computer Fraud and Abuse Act

Takeaway: The DOJ’s recent revisions to their internal policy promote the Department’s goals that the CFAA is applied consistently by government attorneys and better understood by the public. These goals ensure that the law...more

Troutman Pepper

Dark Web Monitoring - Unauthorized Access Podcast

Troutman Pepper on

Immediately following a three-day stint at the Summer 2022 Net Diligence conference in Philadelphia, Kamran and Sadia welcome Kroll’s Keith Wojcieszek to the Unauthorized Access podcast. In this episode, the trio discuss...more

Troutman Pepper

Unauthorized Access: An Inside Look at Incident Response

Troutman Pepper on

Unauthorized Access provides an insightful and interesting recap of the latest developments in cybersecurity. Each month our (mildly funny) hosts, Kamran Salour and Sadia Mirza, will discuss updates on legal developments and...more

McDermott Will & Emery

Relief for White Hat Hackers and Web Scrapers?

McDermott Will & Emery on

In an effort to “promote privacy and cybersecurity by upholding the legal right of individuals, network owners, operators, and other persons to ensure the confidentiality, integrity, and availability of information stored in...more

Proskauer - New Media & Technology

DOJ Revises Policy for CFAA Prosecution to Reflect Developments in Web Scraping and Other Matters

On May 19, 2022, the Department of Justice (DOJ) announced that it had revised its policy regarding prosecution under the federal anti-hacking statute, the Computer Fraud and Abuse Act (CFAA). Since the DOJ last made changes...more

Patterson Belknap Webb & Tyler LLP

DOJ Issues New Guidance for Charging CFAA Cases

In a significant development in anti-hacking criminal enforcement, the Department of Justice last week released new guidance for charging violations of the Computer Fraud and Abuse Act (“CFAA”), the nation’s premier computer...more

Amundsen Davis LLC

Top 5 Cyber Security Threats the Manufacturing Industry Should Watch in 2022

Amundsen Davis LLC on

Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more

Hogan Lovells

German Court grants non-material GDPR damages following data breach

Hogan Lovells on

In a recent judgment, the District Court Munich I granted a data subject compensation under Article 82 GDPR for non-material damages suffered as a result of an unauthorized third-party access to the subject's personal data....more

Wiley Rein LLP

TSA Rail Cybersecurity Directives Show Increasing Government Regulation of Critical Infrastructure and the Private Sector

Wiley Rein LLP on

What: The Transportation Security Administration (TSA) has issued two Security Directives aimed at passenger and freight railroad cybersecurity, continuing the government’s move to an increasingly regulatory approach to...more

Oberheiden P.C.

The Federal Government Is Cracking Down on Cybercrime

Oberheiden P.C. on

Cybercrime has been on the rise in recent years. In response, the federal government has shown an increased interest in prosecuting cybercrime offenses. The Computer Fraud and Abuse Act, codified at 18 U.S.C. Section 1030, is...more

Rivkin Radler LLP

NJ Infertility Clinic Reaches $495,000 Data Breach Settlement

Rivkin Radler LLP on

The New Jersey Attorney General’s Office announced on October 12 that Diamond Institute for Infertility and Menopause, LLC, based in Millburn, NJ, will pay a $495,000 penalty for allegedly violating HIPAA and state law by...more

Oberheiden P.C.

Defending Against Federal Computer Crime Charges Under 18 U.S.C. Section 1030

Oberheiden P.C. on

The Computer Fraud and Abuse Act (CFAA), codified at 18 U.S.C. Section 1030, is one of the U.S. Department of Justice’s most potent weapons in its fight against cybercrimes. It outlines numerous offenses, and it imposes...more

Hinshaw & Culbertson - Lawyers' Lawyer...

The Lawyers' Lawyer Newsletter - Recent Developments in Risk Management - Halloween 2020

Firm Administration – Expense Reporting – Oversight – Discipline - Trick or Treat Editors' Note: Aside from a global pandemic, is there anything more bizarre and troubling than lawyers stealing seemingly paltry sums from...more

Proskauer - New Media & Technology

hiQ Files Opposition Brief with Supreme Court in LinkedIn CFAA Data Scraping Dispute

Last week, hiQ Labs, Inc. (“hiQ”) filed its brief urging the Supreme Court to deny LinkedIn Corp.’s (“LinkedIn”) petition for a writ of certiorari in the Ninth Circuit’s blockbuster ruling in hiQ Labs, Inc. v. LinkedIn Corp.,...more

Bass, Berry & Sims PLC

Privacy Perils: PayPal Data Breach

Bass, Berry & Sims PLC on

On December 1, PayPal disclosed that an ongoing investigation into identify security vulnerabilities identified a data breach that may have compromised personally identifiable information for roughly 1.6 million customers at...more

Snell & Wilmer

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

Bond Schoeneck & King PLLC

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

K2 Integrity

The Threat From Within

K2 Integrity on

Even as organizations hunker down for a long and expensive siege against attackers from cyberspace, a determined employee with the right kind of access can be as much of a threat, if not more. ...more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide