Twenty years ago, as I was working with the FBI and the Secret Service in prosecuting large identity theft rings – often associated with data breaches (although the term “data breach” had not yet entered our daily vernacular) – we created protocols to help consumers prevent identity theft and assist victims recovering from it.Read more »
- March 14, 2019 ‘Full Moon’ Costs Denied by Supreme Court in Oracle Copyright Case
- March 12, 2019 FLSA Double Time
- February 27, 2019 It’s a Bird, It’s a Plane, No… It’s Cryptojacking!
2fa aba alabama american bar association arkansas audit biometric bipa breach notification california ccpa checklist client notification colorado congress consent order consumer consent consumer notification critical security controls cryptocurrency cryptojacking cybersecurity cyber threat data breach data privacy data privacy directive data security delaware department of financial services electronic protected health information employment encryption attack equifax ethics eu eu-u.s. data privacy shield eu-u.s. privacy shield european parliament european unioin european union fbi fcra federal trade commission financial firms financial fraud kill chain fincen fines fraud fraud alert gdpr hacking hhsocr hippa identity theft illinois incidence response plan irs it malware managed service providers massachusetts michigan microsoft office 365 model law modlishka multi-factor identification naic net neutrality new mexico new york ninth circuit nist framework nist security controls ocabr oregon penalties personal data phishing pipeda privacy act ransomware rdp regulations remote desktop protocol social engineering social media south dakota spear-phishing spectre spokeo statute supervisory authorities supreme court tax preparers tax returns tennessee utah virginia wire transfers workplace policy