Twenty years ago, as I was working with the FBI and the Secret Service in prosecuting large identity theft rings – often associated with data breaches (although the term “data breach” had not yet entered our daily vernacular) – we created protocols to help consumers prevent identity theft and assist victims recovering from it.Read more »
- June 03, 2019 CCPA’s Final Requirements in Flux, with Six Months to Go to Comply - Part 1 of 3: Where Does the Law Stand Now?
- May 23, 2019 Non-Competition Agreements – Bracing Yourself Against the Winds of Change
- May 20, 2019 Supreme Court Issues Major Ruling on the Ongoing Viability of Trademark Licenses by Bankrupt Entities
alabama arkansas audit bank secrecy act bipa breach notification california canada ccpa client notification coast guard colorado congress consent order consumer consent consumer notification credit card fraud credit report critical security controls cryptocurrency cryptojacking cybersecurity cyber threat data breach data privacy data privacy act data security department of state digital forensics dmarc ebt electronic benefit transfer electronic information electronic protected health information employment equifax eu eu-u.s. privacy shield european parliament european unioin european union executive order fcra federal trade commission fines fraud fraud alert gdpr hacking hhsocr hipaa hippa homeland security identity fraud identity theft incident response insurance industry internet internet service provider irs it legislative alert malware managed service providers maryland meltdown michigan microsoft office 365 modlishka money service business multi-factor identification naic new jersey new mexico new york nist framework nist security controls office for civil rights oregon passwords personal data phishing pipeda protected health information ransomware regulations research search warrant security rule social engineering social media spectre statute supervisory authorities supreme court tax preparers tax returns utah virginia washington