Connected Cars as Privacy Platforms & Security Networks
NO SURPRISES! intoned the digital advertising guru at the IAPP Global Privacy Summit, preaching the conventional wisdom of the business […]
View ArticleLawsky Warns Banks to Face their Vendor Backdoors
Seeing that for all but the largest banks, cybersecurity is principally a vendor management issue, the NY DFS is scrutinizing […]
View ArticleWhistleblower Helps You Crack the Cybersecurity Protection Racket
Testimony before the Federal Trade Commission last week that a cybersecurity firm staged data breaches to extort clients has […]
View ArticleIS the OPM Breach the Cyber Pearl Harbor?
When the disastrous data breach goes down, it bypasses the digital dossiers of the data brokers. It turns out not to […]
View ArticleThe Privacy Platform Wars are ON!
The privacy platform battles we promised clarified and escalated last week as we learned how services may learn from advanced […]
View ArticleFix your cybersecurity BEFORE you buy cyber-risk insurance, or else….
The shortsightedness of buying cyber-risk insurance before you fix your cybersecurity has just been made painfully clear by the insurance […]
View ArticleYour Privacy Force Field for the Internet of Things
The Internet of Things will teach us all a broader view of privacy as much about what is coming at […]
View ArticleRetailers, Hospitality: Ready for the payments liability shift on 10/1?
If you take payment cards and don’t use chip technology by October 1st, the card brands will have you both […]
View ArticleHow LinkedIn Remakes Love of Work and Learning
At its best, LinkedIn cuts through the boundaries and hierarchies that have kept us from working and learning well together. […]
View ArticlePrivacy and Suffering Under the IoT Bodhi Tree
The cyber-savvy Bodhisvatta understood fear, response and recovery and was therefore unmoved by Mara’s frightening cyber army, so the Internet […]
View ArticleThe Customer-Side Security ABC’s: Understanding Security Audit Requirements...
Author: Amanda M. Witt Many attorneys representing a client who procures technology from a service provider know to request a […]
View Article20 Questions When Your Vendor’s Cyber-Coverage Matters
Authors: Erica J. Dominitz, Barry J. Fleishman and Jon Neiditz Contracts with tech vendors increasingly include requirements of cyber-risk insurance […]
View ArticleThe Sky is the Sublimit: Cyber-Insurance Implications of FTC v. Wyndham
Authors: David L. Cox and Jon Neiditz Much already has been written about the August 24, 2015 ruling by the […]
View ArticleSigns of Cyber-Seriousness
Recent days have produced real and unprecedented signs of concerted efforts to begin to solve global cybersecurity problems. Most […]
View ArticleHow Safe Harbor’s Death Empowers Non-Europeans and Spawns Innovation
Many have recognized that the recent decision by the European Court of Justice (ECJ) on Safe Harbor and the flight […]
View ArticleNo Harm, Big Foul: Why Yesterday’s LabMD Decision is Stunning and Important
Yesterday’s LabMD decision was stunning; here’s why: Unlike the ONLY other FTC target who has ever dared to challenge ANY of […]
View ArticleHow LabMD Could Refocus the FTC on Real World Security
In fighting terrorism or fighting identity theft, the smart triple focus is on prevention of harm through good protection, detection […]
View ArticleWhat Announcements of the FTC’s Wyndham Settlement Do Not Want You to Notice
Wouldn’t it be nice if the enforcers of federal laws we pay to protect us from those who would undermine […]
View ArticlePrivacy, Terror and Trump’s Totalitarianism
The best case for privacy, given where the world appears headed, may be as the quiet place of reflective solitude […]
View ArticleHappy 2016! A New Open Source Data Law Blog for Data’s Big Year
Happy 2016, in which new privacy legal rights emanating from Europe and complex interplay between data value, privacy, security, terror […] The post Happy 2016! A New Open Source Data Law Blog for...
View Article
More Pages to Explore .....