One of the best qualities an information technology (IT) professional can possess is the tenacity to fully troubleshoot and resolve system issues as they occur. Unfortunately, that same drive and sense of urgency to gather relevant facts and to restore inoperable systems as quickly as possible can create issues for the necessary digital forensic investigations following a data security incident.Read more »
- June 03, 2019 CCPA’s Final Requirements in Flux, with Six Months to Go to Comply - Part 1 of 3: Where Does the Law Stand Now?
- May 23, 2019 Non-Competition Agreements – Bracing Yourself Against the Winds of Change
- May 20, 2019 Supreme Court Issues Major Ruling on the Ongoing Viability of Trademark Licenses by Bankrupt Entities
2fa aba alabama american bar association arkansas audit biometric bipa breach notification california ccpa client notification colorado congress consent order consumer consent consumer notification credit reporting critical security controls cryptocurrency cryptojacking cybersecurity cyber threat data breach data privacy data security department of financial services digital forensics electronic protected health information employment encryption attack equifax ethics eu eu-u.s. data privacy shield eu-u.s. privacy shield european parliament european unioin european union fbi fcra federal trade commission financial firms fincen fines forensics fraud fraud alert gdpr hacking hhsocr hippa identity theft illinois investigations irs it it professionals legislative alert malware managed service providers manufacturing maryland massachusetts michigan microsoft office 365 model law modlishka multi-factor identification naic new jersey new mexico new york nist framework nist security controls oregon penalties personal data phishing pipeda privacy act ransomware regulations social engineering social media soppa south dakota spear-phishing spectre spokeo statute supervisory authorities supreme court tax preparers tax returns utah virginia washington wire transfers workplace policy