On October 27, 2023, the Federal Trade Commission (“FTC”) adopted an amendment to the FTC’s Safeguards Rule that will require non-banking financial institutions to notify the FTC within thirty days of discovering a data...more
11/14/2023
/ Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Federal Trade Commission (FTC) ,
Financial Institutions ,
Financial Services Industry ,
Gramm-Leach-Blilely Act ,
Incident Response Plans ,
New Regulations ,
Non-Bank Lenders ,
Regulatory Reform ,
Regulatory Requirements ,
Reporting Requirements ,
Safeguards Rule
2022 has seen a new wave of class action lawsuits targeting companies that use technology to track consumers’ interfaces on their websites. These lawsuits generally allege that the use of technologies such as session replay...more
4/3/2023
/ Bots ,
Data Collection ,
Data Privacy ,
Electronic Communications ,
Electronic Monitoring ,
Health Insurance Portability and Accountability Act (HIPAA) ,
PHI ,
Popular ,
Risk Mitigation ,
Third-Party Service Provider ,
Website Owner Liability ,
Websites ,
Wiretap Act ,
Wiretapping
Introduction -
The cybersecurity threat landscape continues to evolve and present new challenges pertaining to the protection of electronically stored information. Innovative “hacking” tactics constantly emerge and...more
The continued proliferation of tracking technologies has created a landscape of increased exposure for entities serving individuals online. As individuals are increasingly interacting with healthcare services providers...more
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. By design, OT underpins many critical...more
12/22/2022
/ Advanced Notice of Proposed Rulemaking (ANPRM) ,
Corporate Counsel ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Security ,
Department of Homeland Security (DHS) ,
Innovative Technology ,
IT Systems ,
Railroads ,
Security Standards ,
Software ,
TSA
“Side-Channel” attacks generally refer to a type of criminal cyber attacker activity that exploits vulnerabilities so that the attacker can collect and analyze “leakage” of data from a device, as a means to identify certain...more
12/15/2022
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Electronic Protected Health Information (ePHI) ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
Information Technology ,
NIST ,
Risk Management ,
Vulnerability Assessments