Items Tagged with "Legal"


A7290c5bd7bc2aaa7ea2b6c957ef639b

Court Dismissed Another Data Breach Suit

August 06, 2012 Added by:David Navetta

The Holmes decision further underscores difficulties in securing any recovery on a data breach lawsuit absent actual identity theft. However, the lengthy history of this case — dating back to 2008 including a challenge to a Court approved settlement — highlights that such cases are protracted and costly to defend...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Translator Re-Sentenced for Possession of Classified Docs

August 06, 2012 Added by:Headlines

The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Victory Over Cyber Spying

August 04, 2012 Added by:Electronic Frontier Foundation

Congress has been working to pass cybersecurity legislation for years – and EFF has fought to ensure that civil liberties weren’t sacrificed in the process. This year was the hardest: Congress got closer than ever to enacting a bill that could threaten the privacy of online communications. We fought back...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Why the NSA Can’t Be Trusted to Run Cybersecurity Programs

August 01, 2012 Added by:Electronic Frontier Foundation

Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

EU Weighs in on Face Recognition Applications

July 29, 2012 Added by:Electronic Frontier Foundation

Face recognition in online applications is particularly problematic as personal data is sometimes used out of context by employers and law enforcement. Therefore, European privacy officials’ opinion recommending various practices for these applications could not have come at a better time...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Take the A-Train to Find Your Compliance Team

July 25, 2012 Added by:Thomas Fox

As the compliance field evolves, the need for experienced professionals continues to grow, there is the need to hire top notch compliance talent to do the day-to-day work of implementing, enhancing or running a compliance program. Where can you go if you want to hire some experienced compliance professionals?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

New Cybersecurity Bill Patches Serious Vulnerabilities

July 24, 2012 Added by:Electronic Frontier Foundation

We remain unpersuaded that any of the proposed cybersecurity measures are necessary and we still have concerns about certain sections of the bill, especially the sections on monitoring and countermeasures. But this was a big step in the direction of protecting online rights...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Challenges National Security Letter Statute

July 22, 2012 Added by:Electronic Frontier Foundation

Under the national security letter statute, the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Ad Biz Disregards User Choices to Safeguard "Cybersecurity"

July 19, 2012 Added by:Electronic Frontier Foundation

Senator Rockefeller was skeptical about the industry’s claims that they needed to engage in pervasive tracking for cybersecurity purposes. He stated: “I just want to declare the whole cybersecurity matter a total red herring.” We agree that strong cybersecurity does not necessitate surveillance of our browsing habits...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

NLRB Issues Report on Employer Social Media Policies

July 19, 2012 Added by:David Navetta

Specifically, in the latest report, among other issues, the NLRB thoroughly discusses prohibitions on disclosing confidential and proprietary information, posting photographs and other content that depicts other people, and requiring reporting of policy violations. Here are some important take-aways...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Coders Rights at Risk in the European Parliament

July 18, 2012 Added by:Electronic Frontier Foundation

By identifying and disclosing vulnerabilities, coders are able to improve security for every user who depends on information systems for their daily life and work. Yet recently, European Parliament debated legislation that threatens to create legal woes for researchers who expose security flaws...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Cybersecurity, Scare Tactics, and Sacrificing Privacy

July 13, 2012 Added by:Electronic Frontier Foundation

Efforts to break the partisan stalemate over the Cybersecurity Act, a bill that would allow Internet companies to monitor the communications of users and pass that data to the government without any judicial oversight, have backers of the bill attempting to drum up fears about catastrophic cyberattacks...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud: Breaking Laws You Didn't Know Applied

July 11, 2012 Added by:Rafal Los

The challenges of dealing with a completely connected, ubiquitously computable world are that data can be moved, stored, and used anywhere and that the infrastructure that moves that data around is less and less under your control. That's an interesting thing for information security professionals...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

On the Right to Bear Cyber Arms

July 10, 2012 Added by:J. Oquendo

An attacker is decimating my infrastructure. I have purchased and deployed every security technology I can think of. I have contacted law enforcement as a matter of relevance, but I know they will not be able to do much. I have given the service provider two fair warnings. I now fight fire with fire...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FCC Seeks Public Comment on Mobile Data Collection Policies

July 10, 2012 Added by:David Navetta

The FCC revived an inquiry first launched in 2007 to investigate telecom carriers’ practices regarding the privacy and security of information stored on mobile communications devices, prompted by the recent controversy in which software installed on mobile phones was shown to be collecting data from customers...

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Obama Administration Won't Discuss NSA Email Surveillance

July 10, 2012 Added by:Electronic Frontier Foundation

A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »