The California legislature just passed the Age-Appropriate Design Code Act. Conceptually, the goal is to try to make sure that web sites kids visit are appropriate for kids. The problem is, how do you know who is a kid? Once Governor Newsom signs the bill, the code will require sites and apps – BOTH – […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As loss payouts on cyber policies continue to increase, carriers are looking for ways to get out of paying. Since cyber insurance is a non-standard-form policy, you really have to read it carefully to understand whether you are complying. For example, in reviewing one client’s policy, we discovered that if the client did not perform […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Board members and other executives are the key target of hackers. There is even a term for it – whaling. This has nothing to do with anyone’s personal dimensions, but rather that they are the big fish in the pond and have the most access to data. Many times, executives and board members are also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I guess HHS wants to be cool, so rather than having a press conference where people can ask embarrassing questions, they are going to release the proposed changes via a prerecorded video – sometime this summer. These new rules will apply to covered entities (like doctors) and business associates (like IT providers). Part of what […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CIOs have always had to worry about the challenges of preserving evidence, but now we have a whole new class of challenges. The so called Duty to Preserve comes into play when one party learns about the possibility of litigation. This happens, many times, before any lawsuit is actually filed. Once a party has reasonable […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Here is another short read for you (sorry). For those who read this blog on a regular basis, you know that we talk about supply chain risk a lot. Formally, the government calls it Cybersecurity Supply Chain Risk Management or C-SCRM. Supply chain attacks are very popular because if you pull one off (think SolarWinds), […]
Continue reading →
[DISPLAY_ACURAX_ICONS]