Privacy issues are inherent in almost all facets of a business — from operations, employment, and technology to customer service, contracts, legal and compliance — all with varying degrees of risk. Most companies mitigate...more
8/27/2024
/ Business Litigation ,
Cybersecurity ,
Data Privacy ,
Law Enforcement ,
Personal Information ,
Policies and Procedures ,
Popular ,
Privacy Laws ,
Privacy Policy ,
Stored Communications Act ,
Subpoenas ,
Uniform Commercial Code (UCC) ,
Verizon ,
Warrants
In Part I, we discussed the European Commission’s (“Commission”) disapproval of Meta’s “pay or consent” subscription model. In Part II, we delve into the European Commission’s findings, prior findings by the European Data...more
7/29/2024
/ Consent ,
Corporate Counsel ,
Data Privacy ,
Data Protection ,
Data Security ,
EU ,
European Commission ,
European Data Protection Board (EDPB) ,
European Economic Area (EEA) ,
Investigations ,
Personal Data ,
Popular ,
Privacy Laws
For many, responding to an incident feels chaotic — questions swirling, uncertainties piling up, and no clear direction. Even when prepared with a well-rehearsed incident response plan, a data security incident places a...more
Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more
8/17/2023
/ Artificial Intelligence ,
California ,
California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Machine Learning ,
Popular ,
Risk Factors ,
State Privacy Laws ,
Technology Sector
There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more
In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more
6/19/2023
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Breach ,
Data Transfers ,
Digital Platforms ,
International Data Transfers ,
National Security ,
Popular ,
Ransomware ,
Software ,
Technology Sector
Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more
6/7/2023
/ Amended Rules ,
Compliance ,
Cybersecurity ,
Data Disposal Protocols ,
Data Retention ,
Encryption ,
Exemptions ,
Federal Trade Commission (FTC) ,
Financial Institutions ,
Gramm-Leach-Blilely Act ,
Incident Response Plans ,
Information Systems Security Program (ISSP) ,
Multi-Factor Authentication ,
Popular ,
Risk Management ,
Safeguards Rule ,
Securities and Exchange Commission (SEC) ,
Small Business ,
Training Requirements
Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up?
I grew up in a small town of about 3,500 in rural North...more
4/18/2022
/ Business Entities ,
Compliance ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Security ,
Incident Response Plans ,
Internet of Things ,
Popular ,
Technology Sector
As part of Bradley’s continuing coverage of the North Carolina Sandbox Act, we wanted to know what community members and NC fintech aficionados thought about this proposed legislation. We posed six questions to Tariq Bokhari,...more
8/4/2021
/ Banking Sector ,
Blockchain ,
Cybersecurity ,
Data Privacy ,
Emerging Technology Companies ,
Financial Institutions ,
Financial Services Industry ,
FinTech ,
Insurance Industry ,
NGOs ,
North Carolina ,
Popular ,
Proposed Legislation ,
Stakeholder Engagement ,
Startups ,
State and Local Government
Technology is booming and financial technology (“fintech”) is advancing society in new and innovative ways. In 2021 alone, North Carolina has been the target for some very high-profile technology announcements, including...more
On January 22, 2021, Bleeping Computer reported about yet another data dump by the hacker group Shiny Hunters, this time for a clothing retailer. Shiny Hunters is known for exfiltrating large databases of customer...more
2/2/2021
/ Customer Information ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Databases ,
EU ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Passwords ,
Personally Identifiable Information ,
Popular
While the nation waits for the results of the presidential race to be tallied, across the country local and statewide referendums on privacy issues have been decided. In Portland, Maine voters approved a ballot measure to ban...more
As the coronavirus (COVID-19) spread around the world, most businesses were forced to close their doors temporarily and take steps towards working virtually. However, the U.S. construction industry, deemed “essential” by...more
6/24/2020
/ Confidential Information ,
Construction Industry ,
Contractors ,
Coronavirus/COVID-19 ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Internet of Things ,
Policies and Procedures ,
Popular
So, you managed to get your California Consumer Privacy Act disclosures and privacy policy up on your website and you can finally take some much-needed rest, right? Think again. And no, it’s not because of the “CCPA-like”...more
Have you recently received an update from Google or another adtech provider on their CCPA position? Some industry players are rolling out their approaches, and any business that uses website widgets needs to take note...more
11/26/2019
/ Advertising ,
Behavioral Advertising ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Use Policies ,
Google ,
Interactive Advertising Bureau ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Website Owner Liability
The dust has finally settled in the California State Legislature and the big winner for amendments to the CCPA is AB-25, which started out as carving out employees from the definition of consumer for the purpose of CCPA. The...more
9/18/2019
/ Amended Legislation ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Security ,
Disclosure Requirements ,
Opt-Outs ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
Private Right of Action ,
Statutory Requirements
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
1/16/2019
/ Big Data ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Electricity ,
Energy Sector ,
Hackers ,
Information Sharing ,
Popular ,
Power Grid ,
Power Plants ,
Renewable Energy ,
Risk Mitigation ,
Technology Sector ,
Utilities Sector ,
Vendors
On January 1st, South Carolina became the first state to adopt the model insurance data security law requiring certain insurance licensees to investigate and report cybersecurity events in the state of South Carolina. The law...more
1/7/2019
/ Covered Entities ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Security ,
Employer Liability Issues ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Independent Contractors ,
New Legislation ,
Notification Requirements ,
Personally Identifiable Information ,
Popular ,
Reporting Requirements ,
Third-Party Service Provider
On the heels of FinCen and Federal Banking Agencies releasing a joint statement “Encouraging Innovative Industry Approaches to AML Compliance,” Under Secretary for Terrorism and Financial Intelligence Sigal Mandelker...more
12/4/2018
/ Anti-Money Laundering ,
Artificial Intelligence ,
Bank Secrecy Act ,
Banking Sector ,
BSA/AML ,
Cryptocurrency ,
Cybersecurity ,
Digital Currency ,
Financial Institutions ,
FinCEN ,
Popular
Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more
10/3/2018
/ Computer Fraud Insurance ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Protection ,
Hackers ,
Insurance Industry ,
Phishing Scams ,
Policy Exclusions ,
Popular ,
Spoofing
Security researchers and cybersecurity experts recently discovered a weakness in Fiserv’s web platform, which may have exposed the personal and financial details of customers across hundreds of internet banking sites. The...more
Every day, new instances of data breaches, ransomware attacks, and cybercrimes affect companies around the world. Many of these companies are in the construction industry. For some, the thought of protecting one’s...more
8/16/2018
/ Construction Industry ,
Construction Workers ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Employee Training ,
Popular ,
Ransomware ,
Risk Mitigation
On October 18, 2017, the Consumer Financial Protection Bureau (CFPB) outlined nine non-binding Consumer Protection Principles (the Principles) for the access and sharing of consumer information between third-party companies....more
11/29/2017
/ Banking Sector ,
Consumer Financial Protection Bureau (CFPB) ,
Consumer Watchdog ,
Cybersecurity ,
Data Controller ,
Data Security ,
Dodd-Frank ,
EU ,
Financial Institutions ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Online Payments ,
Personally Identifiable Information ,
Popular ,
Transparency ,
UDAAP
It is hard to peruse the internet or even mainstream media outlets without hearing about bitcoin. What is this ubiquitous bitcoin? It depends on whom you ask....more
Financial technology, or fintech, is poised to be the center of U.S. regulation in 2017. Industry experts estimate that between July 2015 and January 2016, more than $5.5 billion was invested in the fintech sector. As fintech...more
7/6/2017
/ Banking Sector ,
Big Data ,
Consumer Financial Products ,
Consumer Financial Protection Bureau (CFPB) ,
Cybersecurity ,
Financial Services Industry ,
FinTech ,
Hackers ,
Innovative Technology ,
Popular ,
Regulatory Oversight