Latest Posts › Popular

Share:

Phishing Subpoenas – A New Privacy Threat?

Privacy issues are inherent in almost all facets of a business — from operations, employment, and technology to customer service, contracts, legal and compliance — all with varying degrees of risk. Most companies mitigate...more

Can Privacy Be Bought? How Scrutiny of Meta’s Subscription Model Has Wider Implications –PART II

In Part I, we discussed the European Commission’s (“Commission”) disapproval of Meta’s “pay or consent” subscription model. In Part II, we delve into the European Commission’s findings, prior findings by the European Data...more

Data Breach 911: Five Immediate Steps to Take

For many, responding to an incident feels chaotic — questions swirling, uncertainties piling up, and no clear direction. Even when prepared with a well-rehearsed incident response plan, a data security incident places a...more

Technological and Legal Defenses Against Privacy Attacks on Machine Learning Models

Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more

How Smart Is Your Artificial Intelligence Policy?

There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Complying With the FTC's Amended Safeguards Rule

Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more

Cyber Defense: Erin Illman on the 5 Things Every American Business Leader Should Do To Shield Themselves From A Cyberattack

Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up? I grew up in a small town of about 3,500 in rural North...more

A Fintech Leader’s Thoughts on the North Carolina Regulatory Sandbox Act

As part of Bradley’s continuing coverage of the North Carolina Sandbox Act, we wanted to know what community members and NC fintech aficionados thought about this proposed legislation. We posed six questions to Tariq Bokhari,...more

What the Proposed North Carolina Regulatory Sandbox Could Mean for Fintech and the Financial Services Community

Technology is booming and financial technology (“fintech”) is advancing society in new and innovative ways. In 2021 alone, North Carolina has been the target for some very high-profile technology announcements, including...more

Why It Matters Whether Hashed Passwords Are Personal Information Under U.S. Law

On January 22, 2021, Bleeping Computer reported about yet another data dump by the hacker group Shiny Hunters, this time for a clothing retailer. Shiny Hunters is known for exfiltrating large databases of customer...more

Privacy at the Polls: Portland, Maine Votes to Ban Facial Recognition Technology

While the nation waits for the results of the presidential race to be tallied, across the country local and statewide referendums on privacy issues have been decided. In Portland, Maine voters approved a ballot measure to ban...more

Struggle Creates Innovation: Technology and Data Privacy for Contractors

As the coronavirus (COVID-19) spread around the world, most businesses were forced to close their doors temporarily and take steps towards working virtually. However, the U.S. construction industry, deemed “essential” by...more

The Top 5 Reasons Your CCPA Work Is Far from Over - Cybersecurity and Privacy Alert

So, you managed to get your California Consumer Privacy Act disclosures and privacy policy up on your website and you can finally take some much-needed rest, right? Think again. And no, it’s not because of the “CCPA-like”...more

CCPA - Adtech Update - Cybersecurity and Privacy Alert

Have you recently received an update from Google or another adtech provider on their CCPA position? Some industry players are rolling out their approaches, and any business that uses website widgets needs to take note...more

California Consumer Privacy Act (CCPA) – Amendment Update - Cybersecurity and Privacy Alert

The dust has finally settled in the California State Legislature and the big winner for amendments to the CCPA is AB-25, which started out as carving out employees from the definition of consumer for the purpose of CCPA. The...more

Grid Electrification: Addressing Cybersecurity Threats and Mitigating Risk in the Renewable Energy Era - ABA Forum

Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more

New Year, New Data Security Requirement: South Carolina Adopts New Data Security Law

On January 1st, South Carolina became the first state to adopt the model insurance data security law requiring certain insurance licensees to investigate and report cybersecurity events in the state of South Carolina. The law...more

To Catch a Terrorist – Innovation, AI, and Public/Private Partnerships in the World of BSA/AML

On the heels of FinCen and Federal Banking Agencies releasing a joint statement “Encouraging Innovative Industry Approaches to AML Compliance,” Under Secretary for Terrorism and Financial Intelligence Sigal Mandelker...more

Cyber Insurance: Court’s Recent Decisions May Change What Your Policy Covers

Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more

Potential Bank Customer Data Exposed through Fiserv Platform Flaw

Security researchers and cybersecurity experts recently discovered a weakness in Fiserv’s web platform, which may have exposed the personal and financial details of customers across hundreds of internet banking sites. The...more

Three Practical Steps to Protect Your Construction Business Against Cyberattacks - Alabama Construction News

Every day, new instances of data breaches, ransomware attacks, and cybercrimes affect companies around the world. Many of these companies are in the construction industry. For some, the thought of protecting one’s...more

Parallel Universe or Coincidence: The CFPB’s New Data Consumer Protection Principles’ Relationship to GDPR

On October 18, 2017, the Consumer Financial Protection Bureau (CFPB) outlined nine non-binding Consumer Protection Principles (the Principles) for the access and sharing of consumer information between third-party companies....more

Bitcoin and Bankruptcy: What You Need to Know about the Value of Bitcoin and Other Cryptocurrencies in Bankruptcy

It is hard to peruse the internet or even mainstream media outlets without hearing about bitcoin. What is this ubiquitous bitcoin? It depends on whom you ask....more

Fintech Forecast: Lawmakers and Regulators Poised to Revamp the Legal Landscape in 2017

Financial technology, or fintech, is poised to be the center of U.S. regulation in 2017. Industry experts estimate that between July 2015 and January 2016, more than $5.5 billion was invested in the fintech sector. As fintech...more

28 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide