Latest Posts › Personally Identifiable Information

Share:

Privacy Tip #329 – Download Apps for Single Use—Then Delete

I traveled this week by plane to a client to conduct a cybersecurity tabletop exercise—one of my favorite things to do (the tabletop, not the flying). - To be able to use the wi-fi, everyone instructed in the gate area was...more

Data Privacy + Cybersecurity Insider - April 2022 #4

CYBERSECURITY - Intelligence Points to Likely Russian Attacks on Critical Infrastructure - The cybersecurity authorities of the United States (including CISA, FBI, NSA and DOE), Australia, Canada, New Zealand, and the...more

Okta Notifies Customers of LAPSUS$ Attack

Okta, which markets itself as a “leading provider of identity” in the healthcare, public sector, energy, financial services, technology, travel and hospitality, and nonprofit industries, has notified some of its customers...more

Indiana Amends Breach Notification Law to Require Notification Within 45 Days

Indiana has amended its breach notification law to require entities to notify individuals “without unreasonable delay, but not more than forty-five (45) days after the discovery of the breach.” It clarifies that a delay is...more

Wyoming Enacts Genetic Data Privacy Act

Governor Mark Gordon signed the Wyoming Genetic Data Privacy Act into law on March 8, 2022. The law goes into effect on July 1, 2022. The Genetic Data Privacy Act requires any business that collects genetic data from...more

Privacy Tip #322 – Monitor Apps Collecting Kids’ Data

There is a federal law, the Children’s Online Privacy Protection Act (COPPA), that requires app developers to obtain parental consent before collecting information from children under the age of 13. The law has been on the...more

Data Privacy + Cybersecurity Insider - March 2022

CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more

Privacy Tip #321 – California AG Warns Consumers About ID Theft from T-Mobile Breach

On March 2, 2022, California Attorney General Rob Bonta urged individuals affected by the T-Mobile breach in 2021 to take advantage of resources to assist with preventing or responding to identity theft. According to the...more

Kronos Biometric Information Class Action Settlement Preliminarily Approved for $15.3M

Kronos, Inc., has agreed to (and a federal judge has preliminarily approved) a $15.3 million settlement to resolve claims that it violated the Illinois Biometric Information Privacy Act (BIPA) by collecting biometric...more

Data Privacy + Cybersecurity Insider - February 2022 #4

CYBERSECURITY - FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure - U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that...more

Data Privacy + Cybersecurity Insider - February 2022 #3

CYBERSECURITY - FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure - U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that...more

Texas AG Sues Meta, Alleging Massive Collection of Face Geometries Without Consent

Texas enacted a biometric information privacy law way back in 2001, which was amended in 2009. That was a long time ago in the context of the development of privacy laws, and even longer when it comes to biometric information...more

Joint International Advisory Warns of Increased Global Threat of Ransomware

A joint Cybersecurity Advisory issued by U.S. and international partners, entitled “2021 Trends Show Increased Globalized Threat of Ransomware,” warns of “the growing international threat posed by ransomware over the past...more

Privacy Tip #319 – How Facial Recognition Technology Works and Why You Should Care

I have written about the privacy concerns of facial recognition technology many times before. Many individuals are unaware of how facial recognition technology works, who is collecting their facial geometry, and how...more

FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure

U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that Russia might launch cyber-attacks against Ukrainian and U.S. networks at the same time it launches...more

Data Privacy + Cybersecurity Insider - February 2022 #2

CYBERSECURITY - Coveware 2021 Q4 Ransomware Report Issued - Coveware issued its 2021 Q4 Ransomware Report on February 1, 2022. The report stated that although average and median ransom payments increased...more

Reporting of Breaches Under 500 Due by March 1

HIPAA requires covered entities and business associates to report to the Office for Civil Rights (OCR) all breaches of unsecured protected health information when the incident involves fewer than 500 individuals no later than...more

Data Privacy + Cybersecurity Insider - February 2022

CYBERSECURITY - FBI Warns Olympics/Paralympics Participants of Cyber “Activities” - On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the...more

FBI Warns Olympics/Paralympics Participants of Cyber “Activities”

On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the 2022 Beijing Winter Olympics and Paralympics,” warning those associated with the Olympics...more

Data Privacy + Cybersecurity Insider - January 2022 #4

CYBERSECURITY - CISA Warns “Every Organization” in U.S. to Assess + Respond to Cyber Risks - The Cybersecurity & Infrastructure Security Agency (CISA) recently issued another warning to “every organization” in the...more

CISA Warns “Every Organization” in U.S. to Assess + Respond to Cyber Risks

The Cybersecurity & Infrastructure Security Agency (CISA) recently issued another warning to “every organization” in the U.S. about cybersecurity risks during the ongoing escalation of tension between the U.S. and Russia over...more

Privacy Tip #315 – Redline Malware Used to Steal Saved Credentials

Passwords are so difficult to remember. We all know we shouldn’t use the same or similar passwords across platforms. Stolen password credentials are dumped on the dark web and criminals use the stolen passwords to steal other...more

Data Privacy + Cybersecurity Insider - January 2022 #2

CYBERSECURITY - New Mexico County Recovering from Ransomware Attack - Another day, another governmental entity hit with a ransomware attack. If you are a resident of Bernalillo County, New Mexico, and you need a marriage...more

China-Based Ransomware Operator Exploiting Log4j Vulnerability

Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on....more

Data Privacy + Cybersecurity Insider - January 2022

CYBERSECURITY - FTC Warns Companies of Enforcement for Failing to Patch Log4j Vulnerability - In what I would describe as an unusual but interesting move by the Federal Trade Commission (FTC), on January 4, 2022, it...more

642 Results
 / 
View per page
Page: of 26

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide