In Van Buren v. United States, the Supreme Court resolved a circuit split as to whether a provision of the Computer Fraud and Abuse Act (CFAA) applies only to those who obtain information to which their computer access does not extend, or more broadly to also encompass those who misuse access that they otherwise
Security
Christopher Ott Interviewed on “Wealth Actually” Podcast
Rothwell Figg partner Christopher Ott was interviewed by Frazer Rice on his “Wealth Actually” podcast, discussing cybersecurity for high net worth individuals. The discussion includes how one should view his or her own digital risks, how to protect oneself, and what to do when you have been compromised.
You can listed to the interview here:
IBM Reports Cyberattacks on COVID-19 Vaccine Distribution Chain
IBM Security (the company’s cybersecurity division) has recently discovered a global phishing campaign targeting organizations associated with the critical coronavirus vaccine distribution chain. The division’s “X-Force,” created at the onset of the pandemic to monitor cyber threats against vaccine developers and distributors, released a report on Thursday with their analysis and recommendations.
Starting in September,…
Phantom Responsibility: How Data Security and Privacy Lapses Lead to Personal Liability for Officers and Directors
Rothwell Figg attorney Christopher Ott published a chapter titled “Phantom Responsibility: How Data Security and Privacy Lapses Lead to Personal Liability for Officers and Directors” in the International Comparative Legal Guide to: Cybersecurity 2021, published by Global Legal Group, Ltd.
Boards of directors ignore data security and privacy risks to companies at the peril of…
Recent Cybersecurity Incidents on the Campaign Trail Highlight Risks for Ordinary Companies
Although this is no ordinary campaign, recent news shows how politicians have many of the same worries as typical businesses. On Thursday, October 29, 2020, the Wisconsin Republican Party reported that it had been victimized by a Business Email Compromise (BEC). There are many ways in which a criminal may conduct a BEC scam but…
Recording and Slides Available from Lexology Webinar on Employee Privacy and Security Considerations in the Age of COVID-19
On Wednesday, September 23, 2020, Rothwell Figg attorneys Martin Zoltick, Jenny Colgate, and Caitlin Wilmot presented a Lexology webinar titled “Employee privacy and security considerations in the age of COVID-19”.
To view the recording of the webinar, please click here. To request the slides from the webinar, please send an email to RFPrivacy@rfem.com…
Martin Zoltick, Jenny Colgate, and Caitlin Wilmot at Lexology Webinar on Employee Privacy and Security Considerations in the Age of COVID-19
Partners Martin Zoltick and Jenny Colgate with associate Caitlin Wilmot will present a webinar in conjunction with Lexology titled “Employee privacy and security considerations in the age of COVID-19” on Wednesday, September 23, 2020, from 11 am – 12 pm ET.
The world changed dramatically in early 2020 as COVID-19 forced companies worldwide to change…
Martin Zoltick, Jenny Colgate, and Caitlin Wilmot at ABA Webinar on Connected Healthcare
Partners Martin Zoltick and Jenny Colgate, along with associate Caitlin Wilmot, will present a webinar titled “Connected Healthcare – Navigating the Patchwork of US Privacy Laws and Developing a Platform that Promotes Trust” for the American Bar Association (ABA) on Monday, September 21, 2020, at 1 pm ET.
As the field of connected…
Fake LinkedIn Accounts – What to Do and What LinkedIn is Doing
On Wednesday, September 2, 2020, Wayne Farms LLC, an entity engaged in processing, packing, and otherwise selling a variety of food products in the United States and internationally, brought suit in the N.D. Illinois against LinkedIn and an unknown “John Doe” or the “fake Pat Gomez” to stop the “John Doe” from posing as an…
Spy Games: How Insider/Outsider Threats Have Become the Newest Cybersecurity Legal Risk
Cybersecurity does not just pose technical challenges; companies must always keep their eye on the human component of cyber risk. For example, even the most damaging and sophisticated hacks – such as the recent Twitter hacks – can result from spear-phishing. Imagine that: multi-billion-dollar new technology communication apparatuses brought to their knees by charming fraudsters…