Since the Corporate Transparency Act took effect on January 1, 2024, scammers have seized the opportunity to send notices to owners of recently formed companies offering “filing services.” In response to these scams, FinCEN...more
5/1/2024
/ Anti-Corruption ,
Anti-Money Laundering ,
Beneficial Owner ,
Corporate Transparency Act ,
Corruption ,
Financial Crimes ,
FinCEN ,
National Security ,
Popular ,
Regulatory Requirements ,
Reporting Requirements ,
Scams ,
Tax Evasion
Chinese company ByteDance faces growing concerns from governments and regulators that its user data from its popular short video-sharing app TikTok could be handed over to the Chinese government. The concern is based on...more
3/3/2023
/ Biden Administration ,
China ,
Data Collection ,
Data Privacy ,
Mobile Apps ,
National Security ,
Popular ,
Proposed Legislation ,
Regulatory Agenda ,
Social Media ,
TikTok
CYBERSECURITY -
Joint Advisory Outlines Attacks by Daixin Team -
The Cybersecurity & Infrastructure Security Agency, the FBI and the U.S. Department of Health & Human Services released a Joint Advisory last week warning...more
11/4/2022
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Employee Monitoring ,
EU-US Privacy Shield ,
Popular ,
Ransomware ,
Vulnerability Assessments
CYBERSECURITY -
Tulsa, OK Refuses to Pay Ransom to Attackers -
The City of Tulsa, Oklahoma, announced on May 9, 2021, that it had been hit with a ransomware attack, but the Mayor is resolute in not paying the demanded...more
Colonial Pipeline paid hackers a ransom of $4.4 million in bitcoin soon after discovering a cybersecurity hack on its systems that began on May 6. The company’s acknowledgement comes after days of speculation about whether a...more
Cyber-attacks and Cybersecurity Failure Are Top Risks of the Next Decade Says World Economic Forum -
Although somewhat obvious, the World Economic Forum, in partnership with Marsh McLennan, SK Group and Zurich Insurance...more
2/16/2021
/ Critical Infrastructure Sectors ,
Cryptocurrency ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Cybertheft ,
Data Breach ,
Data Protection ,
Hackers ,
NYDFS ,
Personally Identifiable Information ,
Popular ,
Social Media
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Americans with Disabilities Act (ADA) ,
California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cybersecurity ,
Dentists ,
Department of Defense (DOD) ,
Drones ,
FBI ,
Federal Aviation Administration (FAA) ,
Federal Contractors ,
Hackers ,
Health Care Providers ,
OCR ,
Personal Data ,
Personally Identifiable Information ,
PHI ,
Popular ,
Ransomware ,
SCOTUS ,
Title III ,
Unmanned Aircraft Systems ,
UPS ,
Vulnerability Assessments ,
Websites ,
WhatsApp
Darkreading.com has issued a survey entitled Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web, which states that malicious insiders are responsible for 27 percent of all cybercrime. This statistic...more
12/10/2018
/ Authentication ,
Cybersecurity ,
Dark Web ,
Data Breach ,
Data Privacy ,
Drones ,
GPS ,
Hackers ,
Law Enforcement ,
Marriott ,
Personally Identifiable Information ,
Popular ,
Putative Class Actions ,
Recruitment Incentives ,
State and Local Government ,
Unmanned Aircraft Systems ,
USPS ,
Vulnerability Assessments
Power Company Fined for Contractor Copying Data to its Own Insecure Network -
Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more
3/30/2018
/ Asset Management ,
Cloud Storage ,
Cybersecurity ,
Data Breach ,
Driverless Cars ,
Drones ,
Electronically Stored Information ,
Energy Sector ,
Federal Aviation Administration (FAA) ,
FERC ,
Fraud ,
Identity Theft ,
Infrastructure ,
NERC ,
NIST ,
Part 107 ,
Popular ,
Social Security ,
State Data Breach Notification Statutes ,
Third-Party Service Provider ,
Unmanned Aircraft Systems ,
Utilities Sector ,
Vulnerability Assessments
Facebook and the English data analytics firm Cambridge Analytica (CA) are facing intense scrutiny in response to numerous reports about the possible misuse of data of 50 million Facebook accounts. The data was originally...more
In an order issued on October 16, 2017, the U.S. Supreme Court granted certiorari in United States v. Microsoft Corporation, a case with potentially far-reaching implications for the privacy of electronic data maintained by...more
10/20/2017
/ Certiorari ,
Criminal Investigations ,
Drug Trafficking ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Internet Service Providers (ISPs) ,
Ireland ,
Microsoft ,
Popular ,
Search Warrant ,
Stored Communications Act ,
Subpoenas
In 2016, new privacy, cybersecurity and/or data security legislation passed or became effective in a number of countries, some adopting data security measures for the first time. Several countries adopted cybersecurity...more
The International Consortium of Investigative Journalists (ICIJ) announced that on May 9, it will release selected data purported to be leaked or stolen from the internal records of the Panamanian law firm Mossack Fonseca....more
German auto manufacturer Volkswagen (VW) is reportedly using German privacy laws to resist turning over its top executives’ internal corporate emails and other communication materials to United States attorneys general and...more
The National Labor Relations Board (NLRB), in a 2-1 decision, ruled against blanket employer policies banning employees from taking photos or recordings in the workplace. Such policies would, in the view of the NLRB, having a...more
An interagency working group led by The National Institute of Standards and Technology (NIST) and The Department of Commerce recently published a draft report (the “Report”) recommending that the U.S. government increase its...more
A number of courts have considered whether the Fourth Amendment requires the government to obtain a warrant to access historical and/or real time cell phone geographic location information, known as CSLI. CSLI is cell site...more
8/10/2015
/ Cell Phones ,
Criminal Investigations ,
Data Collection ,
Data Privacy ,
FL Supreme Court ,
Fourth Amendment ,
Geolocation ,
Popular ,
Reasonable Expectation of Privacy ,
SCOTUS ,
Search Warrant ,
Smartphones ,
Warrantless Searches
Earlier this year, an affiliate of the hedge fund Standard General LP assumed more than 1,700 RadioShack® store leases in an auction sale in the electronics retailer’s bankruptcy. Standard General reportedly plans to partner...more
5/26/2015
/ Apple ,
AT&T ,
Business Assets ,
Commercial Bankruptcy ,
Commercial Leases ,
Customer Lists ,
Data Collection ,
Federal Trade Commission (FTC) ,
Popular ,
RadioShack ,
Retailers
Shortly after the discovery of a cybersecurity breach at the health insurance company Anthem, Inc., the National Association of Insurance Commissioners (NAIC) called for a multi-state examination of Anthem’s cybersecurity...more