A business retains a vendor to perform data processing services. Malicious hackers access a vulnerable port on one of the vendorRead more »
- June 03, 2019 CCPA’s Final Requirements in Flux, with Six Months to Go to Comply - Part 1 of 3: Where Does the Law Stand Now?
- May 23, 2019 Non-Competition Agreements – Bracing Yourself Against the Winds of Change
- May 20, 2019 Supreme Court Issues Major Ruling on the Ongoing Viability of Trademark Licenses by Bankrupt Entities
2fa aba alabama american bar association arkansas audit audit logging biometric biometric data bipa bitcoin breach notification california ccpa checklist client notification colorado congress consumer notification credit reporting cryptocurrency cybersecurity cyber threat data breach data privacy data privacy directive data protection officer data security delaware department of commerce department of financial services employment encryption attack equifax ethereum ethics eu eu-u.s. data privacy shield eu-u.s. privacy shield european parliament european union fbi fcra federal communication federal trade commission financial firms financial fraud kill chain fincen fines gdpr hacking hippa identity theft illinois incidence response plan insider attacks investigations irs it legislative alert malware maryland massachusetts microsoft office 365 model law multi-factor identification net neutrality new jersey new mexico new york ninth circuit nist security controls nydfs ocabr patching penalties personal data phishing privacy act privacy notification ransomware rdp regulations remote desktop protocol security posture assessment service provider agreement social engineering social media south dakota spear-phishing spokeo statute supreme court tax returns tennessee utah virginia washington wire transfers workplace policy