Bring Your Own Device (BYOD) – Be Smart
At the dawn of portable electronic devices, they were primarily work-related productivity tools. Often, employers would purchase (or lease) devices and distribute them to their need-to-have employee...
View ArticleThe C-Suite’s Perspective on Cybersecurity and Liability
Recently, IBM surveyed more than 700 C-Suite executives in 18 industries and 28 countries about their views on cybersecurity. Ninety-four percent of those interviewed believe that their respective...
View ArticleYou Just Used My Picture Without Permission?
Artist Richard Prince’s exhibit entitled “New Portraits’’ was displayed at New York City’s Gagosian Gallery and Frieze New York during the summer of 2015. This exhibit featured screenshots of other...
View ArticleLegal Considerations for Website Privacy Policies
You finally created your website. Did you include eye-catching graphics? Check. Did you include an attention-grabbing banner slogan? Did you post all of your social media handles? Did you include a...
View ArticleThe Anthem Breach – A Retrospective
Many people and news outlets have opined, weighed in, and informed the public about the 2015 Anthem breach. It remains a hot topic in January 2017, because it currently lines up with other hot stories...
View ArticleKey HIPAA Settlement Agreements by HHS’s Office for Civil Rights in 2015 & 2016
The last time this blog presented an overview of key HIPAA settlement agreements at the Office for Civil Rights in the U.S. Department of Health and Human Services was a review of 2014. The number of...
View ArticleISO’s Privacy Standard for Cloud Service Providers
In July 2014, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) issued a new security standard – ISO 27018 – which attempts to outline...
View ArticleThe Anthem Breach – A Retrospective (Part II)
We published Part I of our “Anthem Breach Retrospective” in January 2017. Coincidentally, at around the same time several plaintiffs in one of the earliest filed cases arising out of the Anthem data...
View ArticleCyber Security and Social Engineering: A Big Low Tech Problem
Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against...
View ArticleAutonomous Vehicles and All That Data
In an earlier post, we discussed the potential ownership models for autonomous vehicles, also known as driverless cars (“AVs”). Models range from true traditional ownership as we understand it today,...
View ArticleA TCPA Slam Dunk in the Ninth Circuit?
The fight is not over yet, but the insurance industry just had a significant victory in the United States Court of Appeals for the Ninth Circuit. The scenario is likely familiar to most. You’re invited...
View ArticleDespite Equifax Breach Causes, Social Engineering Still Biggest Threat to...
It’s now been widely reported that the cause of the recent Equifax data breach, which compromised the personal data of perhaps as many as 143 million people, was the result of the company’s alleged...
View Article