The U.S. Supreme Court recently noted, in Carpenter v. US, that Americans “compulsively carry cell phones with them at all times.” For those with iPhones and iPads, have you spent time in Settings protecting your private information? This article from the Palm Beach Bar Association Bulletin, explains ten different ways …
Thanks to the members of ASIS International Palm Beach #254 for the gracious invitation to speak to about the “Anatomy of a Data Breach Lawsuit.” This was an educational opportunity to discuss the stages of a data breach lawsuit (from the lawyer’s perspective) and how to protect company assets. You …
Relying upon a statute which has been amended twice since 1978, it is a crime in Florida to access someone else’s social media account without their authorization. This likely happens dozens of times a day in this state, likely as a joke or a prank, which have or could lead …
The House Permanent Select Committee on Intelligence (HPSCI) released in December 2016 a partially-redacted copy of its September 15, 2016 report on its, “Review of the Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden” (“House Report”). The House Report describes Snowden in the same tenor and tone that the …
My article, “Don’t Connect Your Phone to Rental Cars” explained how rental cars (and your leased car!) can collect data from your smartphone which creates a vulnerability when the next driver takes the car. The original post was a Business Advocate post at McDonald Hopkins.com, here. It was also cross-posted …
In Facebook v. Power Ventures, Inc. et al., the Ninth Circuit held that it was a violation of the Computer Fraud and Abuse Act of 1986 for the defendant to continue to access Facebook’s site after receiving a cease and desist letter from Facebook: “a defendant can run afoul of …
Thanks to professor and attorney Larry Buck for inviting me to speak today about Data Breach & Cyber Security Law at Florida Atlantic University. We discussed: Standing: how the Clapper case was filed too soon, they lost in the Supreme Court, and then three months later it was revealed, beyond their …
James Veitch is a British writer and comedian. How he ended up on a TED Talk stage with this bit of techo-stand up, I dunno. But he hit it out of the park with “This Is What Happens When You Reply to Spam Email.” I highly recommend. It’s about 9 …
When most people think of data breach lawsuits, they think of large class action cases and settlements like Remijas v. Neiman Marcus and Target. But the vast majority of courts are denying class certification in cyber security cases. Within nearly a week of each other, two federal courts in New …
The FTC recently announced settlement with Henry Schein Practice Solutions for $250,000 in exchange for resolving the FTC’s claims that Schein falsely advertised that its dental office management software provided encryption. You can read the article, “The Database Software says it is ‘encrypted’… but is it?” here at McDonald Hopkins’ …
If you log onto the once-popular virtual currency exchange, Cryptsy, you can see the virtual version of tumbleweeds blowing through a western town in the form of “volume – 00.00” across the board. On January 14, 2016, the host “Big” Paul Vernor posted this blog post stating that hackers had …
This one page article explains the 9 most common ways your clients and companies get hacked — in a single page Palm Beach Bar article. Don’t know a DDOS from a SQL attack? Brute force or a reverse brute force. Read the kama sutra of hacking-for-lawyers, here.
The recent cases of FTC v. Wyndham and In Re TerraComm and YourTel America, we have seen that federal government agencies are pursuing companies who have negligent cybersecurity standards — and the government is winning. In fact, the government need not point to specific statutory violations to win these cybersecurity cases …
In light of the rulings in FTC v Wyndham and In Re TerraCom and YourTel, it is evident that government agencies are taking the position that they can pursue “common law” cyber security negligence claims rather than relying on standards set by regulation or statute. At least some of these …
The Department of Defense has issued an Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS). The specific focus is on new rules which require contractor reporting on network penetrations. Additionally, this Rule implements DoD policy on the purchase of cloud computing services. The Interim Rule is here. According to …
Something went wrong with the twitter. Please check your credentials and twitter username in the twitter settings.