Data Privacy & Cybersecurity
Most people in the U.S., including regulators, seem comfortable with the notion that a few U.S. behemoths are on their way to becoming both gatekeeper and gate, but in much of the rest of the world there is alarm.
Many companies use third party social media sites, for a variety of purposes including marketing and interacting with customers. A […]
The man responsible for hacking personal email accounts that revealed Hillary Clinton’s habit of using a personal email account for […]
The amount and detail of information contained in metadata (data about data embedded in files) is staggering, and it can […]
This list of seven best practices to achieve “cyber resilience” is based on Symantec’s 2016 Internet Security Threat Report. Some […]
The U.S. intelligence community has “already had some indications” of hacking attempts on presidential campaigns, U.S. National Intelligence Director James […]
The First Circuit, reversing a lower court dismissal, found that the way Gannett exploited its free USA Today video app […]
In the wake of an $81 million online theft from a Bangladeshi bank that was using the SWIFT system, the […]
Since October of last year, seven employees who left the Federal Deposit Insurance Corp have taken data with… ..
Depending on the policy wording, the third-party liability protections may be less than meets the eye.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.