Apple has announced that its iOS 15 update will actively scan text messages and images on iPhones for sexually explicit materials involving minors in an effort to combat the spread of child pornography. The spread of child exploitation materials on the Internet is...
Cyber Security & Data Breach
Supply Chain Security: Is Your Business Vulnerable to Cyber Attacks in Your Supply Chain?
The massive exploit of the company Solar Winds has been seen as an example of what is called “supply chain” vulnerability. In point of fact, the vast majority of those impacted by the Russian Solar Winds attack probably had never heard of the company Solar Winds, and...
Ohio Personal Privacy Act Introduced: A Possible First Step In Privacy Protections
Currently, twenty states have enacted legislation to protect the collection and distribution of consumer data by third parties. However, at the moment, there are no privacy protections in place for consumers in Ohio. On July 12, 2021, Rick Carfagna and Thomas Hall...
TransUnion v. Ramirez: Privacy Takes a Hit In the High Court
A Brief History of the Fair Credit Reporting Act One of the earliest “privacy” laws in the United States is, surprisingly, the Fair Credit Reporting Act. Back during the Nixon Administration, Congress passed a law that gave people the right to see what was on their...
Time to Make Your Websites and Apps Accessible to the Disabled
The Americans With Disabilities Act (ADA) requires, among other things, that places of “public accommodation” be reasonably accessible to the disabled. For “physical” locations, this can mean things like braille menus, wheelchair ramps, or wider doors. But when the...
Ransomware Warning: White House Issues Advisory to Business Leaders
In the wake of the highly publicized attacks on both gasoline and food infrastructures by Russian-based ransomware attackers, the Biden administration on June 3 issued an advisory to business leaders directing them to take action to harden their systems against...
Supreme Court Poised To Decide Scope of Federal Hacking Law: Implications for Businesses & Employees
For more than 30 years, the federal computer hacking statute has been used by companies to sue employees (and former employees), competitors and even customers and users who violate their rules on the use of computers, computer databases and data gleaned from...
High Court Deals Blow to Data Privacy/Cybersecurity Regulation
Like the Kubler-Ross stages of grief, there are multiple stages of data breach. Anger, denial, blame, investigation, litigation, regulation and, ultimately, resignation. This includes possible class action litigation by consumers, banks, vendors, suppliers or others...
Cyber Insurance: Court Says a Demand for Payment Is Not a Claim
One of the more common forms of cyber-attack is that of a Business E-Mail Compromise - when the email account of either a buyer or seller (or both) is compromised by a hacker who then spoofs one or both of the parties to demand or redirect payments intended to occur...
Opting Out: New California Regulations Protect Personal Information
On March 15, 2021, the California Attorney General finalized modified regulations to the California Consumer Protection Act (the “CCPA”) that strengthen consumers’ ability to “opt out” of having their personal data collected, sold, or otherwise used. The California...