9/18/14
By: Mark A. Begnaud
On September 4, 2014, the Eleventh Circuit Court of Appeals voted to rehear the case of United States v. Quartavious Davis en banc. In the original opinion, the Court found that all cell-site data is …
9/18/14
By: Mark A. Begnaud
On September 4, 2014, the Eleventh Circuit Court of Appeals voted to rehear the case of United States v. Quartavious Davis en banc. In the original opinion, the Court found that all cell-site data is …
A Solution to Medical Professional Texting And HIPAA Compliance
8/26/14
By: J. Scott Rees
Everyone texts today – your kids, your friends, your doctors. With electronic health records (EHR) going from a trend to the mandated standard, digital and electronic technologies have become fully integrated into nearly every aspect …
Employer Beware: BYOD and the Remote Data Wipe
8/13/14
By: Kacie L. Manisco
A growing number of companies have implemented Bring Your Own Device (BYOD) programs that allow employees to use their own phones and devices for both business and personal activities. Such programs benefit employers and employees alike, …
VISA Issues Security Alert Due to Increased Data Breaches Caused by Insecure Remote Access
7/30/14
By: David Cole
When a merchant experiences a data breach involving credit card information, it is often required by the card brands to hire a Payment Card Industry Forensic Investigator (PFI). The PFI investigates the incident and then provides a …
Lessons from The eBay Data Breach
6/3/14
By: David Cole and Behnam Salehi
Earlier this month, eBay became the latest victim of a high-profile cyber-attack, following recent attacks on large businesses like Target and Adobe. The attack on eBay resulted in one of the biggest data breaches …
5/13/14
By: David Cole
Verizon recently released its 2014 edition of its Data Breach Investigation Report. You can download a copy here for your reading pleasure — or heartburn. Retailers should take particular note of this report. As Verizon states, “(2013) …
NLRB Seeks Control Over Employers’ Email Accounts
5/6/14
By: David Cole
If you have been diligent about reading our prior articles or attending our seminars (examples of them here, here, and here), then you have, hopefully, implemented or revised your e-mail, social media, and “bring …
Yelp Lawsuits Signal Rise in Internet Defamation Cases
4/30/14
By: Matt Foree
The ubiquity of social media and internet communications has drastically increased the opportunities for defamation. The spread of defamatory statements to countless individuals is often as easy as pushing a button.
Recent defamation cases regarding user review …
A Picture is Worth a 1000 Words
4/30/14
By: Seth Kirby
In the ever evolving world of marketing through social media, companies strive for ways to drive traffic to their virtual doorsteps. The constant question running through the mind of a person tasked with internet marketing is “what …
4/1/14
By: David Cole
In credit card data breaches, individual consumers are usually not directly harmed because they are issued new cards and not held responsible for fraudulent charges. Instead, it is the card issuers that are usually harmed because they …
Three Steps to Reduce Your Data Breach Exposure
3/13/14
By: David Cole
The U.S. is on pace for a record number of data breaches in 2013. If you think your organization is not at risk, guess again. Any organization with information about its customers, employees, or other individuals is …
Best Practices for Gramm-Leach-Bliley Compliance
3/12/14
By: David A. Cole
The U.S. Commodity Futures Trading Commission (Commission) recently issued a Staff Advisory on the recommended best practices for covered financial institutions that must comply with Gramm-Leach-Bliley Act (GLBA) provisions on data security and customer privacy.
Congress …