X

data security

Mitigating Cloud Vulnerabilities – NSA Publish Guidance

Extract from the National Security Agency Cybersecurity Information Update

Assess Risk After a Breach – Including Security Breach Notification Laws By State

A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted…

Biometric Information Privacy Act at a Glance

The BIPA guards against the unlawful collection and storing of biometric information.

Data Security: Password Tips From Hackers

It’s no secret that malicious cyber activity costs businesses and the economy dearly. For small business, the cost and damage…

Risk or Reward? Service Organization Control “SOC” Reports

As legal technology and advancements within areas such as cloud technology and software-as-a-service, clients are facing increased pressure to make…

Recent Case Law: Takeaways From The 11th Circuit Decision In FTC v. LabMD

What does this ruling mean with respect to your company (or your client)? Extract from an article by Tom Kulik…