Twenty years ago, as I was working with the FBI and the Secret Service in prosecuting large identity theft rings – often associated with data breaches (although the term “data breach” had not yet entered our daily vernacular) – we created protocols to help consumers prevent identity theft and assist victims recovering from it.Read more »
- June 03, 2019 CCPA’s Final Requirements in Flux, with Six Months to Go to Comply - Part 1 of 3: Where Does the Law Stand Now?
- May 23, 2019 Non-Competition Agreements – Bracing Yourself Against the Winds of Change
- May 20, 2019 Supreme Court Issues Major Ruling on the Ongoing Viability of Trademark Licenses by Bankrupt Entities
2fa aba alabama american bar association arkansas audit biometric bipa breach notification california canada ccpa client notification coast guard colorado congress consent order consumer consent consumer notification credit report critical security controls cryptocurrency cryptojacking cybersecurity cyber threat data breach data privacy data privacy act data security department of financial services digital forensics dmarc ebt electronic information electronic protected health information employment equifax eu eu-u.s. privacy shield european parliament european unioin european union executive order fcra federal trade commission fines fraud fraud alert gdpr hacking hhsocr hippa identity theft internet internet service provider irs it it professionals legislative alert malware managed service providers maryland meltdown michigan microsoft office 365 model law modlishka money service business multi-factor identification naic new jersey new mexico new york nist framework nist security controls oregon passwords penalties personal data phishing pipeda protected health information ransomware regulations search warrant security rule social engineering social media south dakota spectre spokeo statute supervisory authorities supreme court tax preparers tax returns utah virginia washington wire transfers