Quantcast
Channel: Information Security – Big Data Tech Law
Browsing all 40 articles
Browse latest View live

Connected Cars as Privacy Platforms & Security Networks

NO SURPRISES! intoned the  digital advertising guru at the IAPP Global Privacy Summit, preaching the conventional wisdom of the business […]

View Article



Lawsky Warns Banks to Face their Vendor Backdoors

Seeing that for all but the largest banks, cybersecurity is principally a vendor management issue, the NY DFS is scrutinizing […]

View Article

Whistleblower Helps You Crack the Cybersecurity Protection Racket

­ Testimony before the Federal Trade Commission last week that a cybersecurity firm staged data breaches to extort clients has […]

View Article

IS the OPM Breach the Cyber Pearl Harbor?

When the disastrous data breach goes down, it bypasses the digital dossiers of the data brokers.  It turns out not to […]

View Article

The Privacy Platform Wars are ON!

The privacy platform battles we promised clarified and escalated last week as we learned how services may learn from advanced […]

View Article


Fix your cybersecurity BEFORE you buy cyber-risk insurance, or else….

The shortsightedness of buying cyber-risk insurance before you fix your cybersecurity has just been made painfully clear by the insurance […]

View Article

Your Privacy Force Field for the Internet of Things

The Internet of Things will teach us all a broader view of privacy as much about what is coming at […]

View Article

Retailers, Hospitality: Ready for the payments liability shift on 10/1?

If you take payment cards and don’t  use chip technology by October 1st, the card brands will have you both […]

View Article


How LinkedIn Remakes Love of Work and Learning

At its best, LinkedIn cuts through the boundaries and hierarchies that have kept us from working and learning well together. […]

View Article


Privacy and Suffering Under the IoT Bodhi Tree

The cyber-savvy Bodhisvatta understood fear, response and recovery and was therefore unmoved by Mara’s frightening cyber army, so the Internet […]

View Article

The Customer-Side Security ABC’s: Understanding Security Audit Requirements...

Author:  Amanda M. Witt Many attorneys representing a client who procures technology from a service provider know to request a […]

View Article

20 Questions When Your Vendor’s Cyber-Coverage Matters

Authors:  Erica J. Dominitz, Barry J. Fleishman and Jon Neiditz Contracts with tech vendors increasingly include requirements of cyber-risk insurance […]

View Article

The Sky is the Sublimit: Cyber-Insurance Implications of FTC v. Wyndham

Authors: David L. Cox and Jon Neiditz Much already has been written about the August 24, 2015 ruling by the […]

View Article


Signs of Cyber-Seriousness

Recent days have produced real and unprecedented signs of concerted efforts to begin to solve global cybersecurity problems.   Most […]

View Article

How Safe Harbor’s Death Empowers Non-Europeans and Spawns Innovation

Many have recognized that the recent decision by the European Court of Justice (ECJ) on Safe Harbor and the flight […]

View Article


No Harm, Big Foul: Why Yesterday’s LabMD Decision is Stunning and Important

Yesterday’s LabMD decision was stunning; here’s why:  Unlike the ONLY other FTC target who has ever dared  to challenge ANY of […]

View Article

How LabMD Could Refocus the FTC on Real World Security

In fighting terrorism or fighting identity theft, the smart triple focus is on prevention of harm through good protection, detection […]

View Article


What Announcements of the FTC’s Wyndham Settlement Do Not Want You to Notice

Wouldn’t it be nice if the enforcers of federal laws we pay to protect us from those who would undermine […]

View Article

Privacy, Terror and Trump’s Totalitarianism

The best case for privacy, given where the world appears headed, may be as the quiet place of reflective solitude […]

View Article

Happy 2016! A New Open Source Data Law Blog for Data’s Big Year

Happy 2016, in which new privacy legal rights emanating from Europe and complex interplay between data value, privacy, security, terror […] The post Happy 2016! A New Open Source Data Law Blog for...

View Article
Browsing all 40 articles
Browse latest View live




Latest Images