The media has been talking about the feds running Stingrays and Dirtboxes to gather cell phone data on potentially thousands of Americans. The government’s take on this has been that a warrant is not required. The FBI made their position known in a private briefing to the Senate Judiciary Committee last week. The result was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As has been the case for more than 10 years, California leads the way, for better or worse, for the rest of the country in protecting resident’s privacy. Their original breach law, SB 1386, is the model for laws for the rest of the country. So, what is new in 2015 – read on. If […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of us who are not insurance experts, the distinction may not be obvious. As explained in more detail here, the difference is in who experiences the loss. First party coverage covers damage to your business such as costs of notifying customers, purchasing credit monitoring services, repairing reputational damage or paying a cyber extortionist. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The National Law Review has a great article on board member’s responsibility in the area of cyber security. One quote from the article: a 2012 Carnegie Mellon poll of how U.S. boards are managing cyber risks found that 71% rarely or never review privacy and security budgets, 80% rarely or never review roles and responsibilities, and nearly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HR 4681, the Intelligence Authorization Act for FY 2015 was signed into law on December 19th, 2014 and provides funding for the intelligence community until next September. The bill and now law contains one section – section 309 – that deals with the collection, retention and sharing of information collected by the intelligence community. Because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am certain we will see a number of people comment on what Sony shoulda/coulda/oughta have done and there is likely some truth in all of them. Here is one and my thoughts on it, from Data Breach Today. This is from a blog post by Matthew Schwartz. He makes 7 points, which I mostly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]