Want To Protect Privacy? Get Off Social Media, Indiana Federal Court Says

Privacy issues surrounding social media abound, including what’s considered ‘content’ privacy and ‘non-content’ privacy When the government wants to get data about you from someone other than you (a third party), does it … Continue reading Want To Protect Privacy? Get Off Social Media, Indiana Federal Court Says

Zooming [In]Security

With the COVID-19 Pandemic (remember the COVID-19 Pandemic?) workers were forced to find other means of communicating — including Zoom meetings. While there were a spate of high-profile security issues with respect to Zoom, including open and shared meetings, Zoombombing, sharing data with Facebook, and deliberately routing communications through China and the like, the principal…

The post Zooming [In]Security appeared first on SecurityCurrent.

Continue reading Zooming [In]Security

Data Breach Litigation Waivers: Be Careful What You Wish For

Companies with data breach litigation waivers may find those waivers used against them by savvy law firms In her 1969 book, “On Death and Dying,” Elisabeth Kübler-Ross described the five stages of grief and loss: Denial and isolation Anger… Continue reading Data Breach Litigation Waivers: Be Careful What You Wish For

Texas Court Backs Phishing Attack Insurance Claim

Are insurance companies bound to pay claims for phishing attacks resulting in third-party losses? RealPage, a Texas-based company, operated a rent-servicing portal whereby renters could pay their rent and landlords could get paid (minus, of course, a … Continue reading Texas Court Backs Phishing Attack Insurance Claim

Disney Insisting on ‘Star Wars’ #Hashtag Contract?

In a particularly annoying meme, the fourth day of the fifth month has earned the moniker “Star Wars Day” because of the expression, “May the Fourth be with you.” But Disney has moved to put celebrants under a contract with binds tighter than Pri… Continue reading Disney Insisting on ‘Star Wars’ #Hashtag Contract?

Cybersecurity and COVID: 5 Lessons

Without belaboring the point, there are many similarities between the COVID-19 pandemic and cybersecurity. We can learn from the response to the COVID pandemic lessons about cybersecurity. We Know It Is Coming For decades, public health planners have b… Continue reading Cybersecurity and COVID: 5 Lessons

Supreme Court Looks at Computer Trespass Meaning

Federal statutes have muddied the waters on the meaning of computer trespass, but a Supreme Court case may clear the air When Congress passed a federal statute on computer fraud in 1984, it was concerned with the problem of people “breaking in” to comp… Continue reading Supreme Court Looks at Computer Trespass Meaning

Scraping By – California Court Limits Use of Computer Crime Statute for High Volume Scraping

When you “access” a website, what are you authorized to do? And how would you know what is “authorized?” The federal Computer Fraud and Abuse Act, 18 USC 1030 makes it a crime to “access” a “computer” “without authorization,” and further makes it a crime to “exceed authorization” to access a computer. Courts and computer…

The post Scraping By – California Court Limits Use of Computer Crime Statute for High Volume Scraping appeared first on SecurityCurrent.

Continue reading Scraping By – California Court Limits Use of Computer Crime Statute for High Volume Scraping

Facebook Privacy Tracking Lawsuit Can Continue, Court Says

Everyone knows that when you use a social media site such as Facebook, the website is collecting information about you. I’m not sure whether, even with privacy settings set, that people know who is getting access to this information, for what purposes… Continue reading Facebook Privacy Tracking Lawsuit Can Continue, Court Says