Blog
Data Privacy & Cybersecurity Blog Posts From September 2022
-
Blog: California Legislature Takes Steps to Regulate Collection and Storage of Children’s Data
Date: September 29, 2022
Title: California Legislature Takes Steps to Regulate Collection and Storage of Children’s Data
Summary: On September 15, 2022, California Governor Newsom signed the California Age-Appropriate Design Code Act (the Act). This Act, scheduled to go into effect July 1, 2024, is the first state law to require heightened standards for businesses’ collection and use of the personal information of California individuals under the age of 18. Currently the federal Children’s Online Privacy Protection Act (COPPA) protects data of minors who are under the age of 13....
-
Blog: Wire Transfer Fraud – Can Funds Be Recovered?
Date: September 20, 2022
Title: Wire Transfer Fraud – Can Funds Be Recovered?
Summary: Businesses are constantly targeted by criminals attempting to gain access to information that will allow them to fraudulently divert wire transfers. This fraud often occurs after the criminal has compromised the email account of someone in the company who can approve such transfers, taking over communications with customers and vendors. This exploit has become a multibillion-dollar criminal business model. But can those funds be recovered? And how can you protect yourself from such attacks?...
-
Blog: The “September 6th Rule”: OFAC Consolidates Seven-Year Patchwork of Laws, Reissues Cyber-Related Sanctions Regulations
Date: September 07, 2022
Title: The “September 6th Rule”: OFAC Consolidates Seven-Year Patchwork of Laws, Reissues Cyber-Related Sanctions Regulations
Summary: On September 6, 2022, without notice or opportunity for public comment, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) published a Rule – which took immediate effect – consolidating a seven-year patchwork of “Cyber-Related Sanctions Regulations.” The Rule did not revise any laws; it merely restated the U.S. government’s opposition to the provision of material support for malicious cyber-enabled activity originating outside the United States....