Close

Articles Posted in Data Protection

Updated:

The New UK-U.S. Data Bridge

The UK and U.S. Governments have now formalized the UK-U.S. Data Bridge. The U.S. Attorney General designated the UK as a “qualifying state” for the purposes of the Executive Order 14086 on September 18, 2023, and the UK regulations implementing the Data Bridge are scheduled to take effect on October…

Updated:

Power Grids and Points of Vulnerability: Keeping the Lights on Amid Cybersecurity Concerns

Alicia McKnight and Brian Finch urge energy industry players to evaluate cybersecurity risks posed by increasingly interconnected and internet-enabled power grids in an article which was published in the latest edition of Pratt’s Privacy & Cybersecurity Law Report.

Updated:

Shifting Landscapes and Veiled Identities: The Usual Suspects Behind Ransomware Attacks

The actors behind ransomware tend to fall into two categories: cybercriminal gangs, often based in Eastern Europe, and groups backed by economic outcasts like Iran, Russia and North Korea. Historically the first prefer a shotgun approach; the second behave more like snipers. Here are a few of the groups that…

Updated:

The Many-Headed Threat of Ransomware

It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one of the oldest crimes out there—holding someone or something hostage until someone else…

Updated:

News of Note for the Internet-Minded (2/1/22) – AI Colleagues, AR Experiences and Ransomware Dangers

Can AI build AI, what does an augmented reality theater production look like, what is the “quantum apocalypse,” and more… AI gets meta: Researchers at the University of Guelph develop “hypernetwork” to build AI. (Olivia Fields, Quanta Magazine) MIT researchers develop training process to help humans collaborate with AI “colleagues.”…

Updated:

Ransomware, Data Breaches and the Tension Between Disclosure and Damage Control

Brian Finch recently returned to Joel Simon‘s Industry Insights podcast to discuss the uptick in cyberattacks, data breaches perpetuating insider trading and strategies companies can employ to guard against these problems. Joel Simon: It’s hard to believe it’s been more than 10 months since you joined us for a discussion…

Updated:

Does the CFAA Apply to Website Scraping? The Ninth Circuit Says “Not So Fast”

Companies use a variety of causes of actions to protect their websites from competitors or others wanting to “scrape” data from their site using automated tools. Over the years, legal doctrines such as copyright infringement, misappropriation, unjust enrichment, breach of contract, and trespass to chattels have all been asserted, though…

Updated:

CCPA, GDPR and the Future of Cross-Device Tracking

Efforts to regulate cross-device tracking have increased since we last addressed the topic in 2017, following the release of the FTC’s Staff Report. Significant developments include the implementation and enforcement of the EU’s General Data Protection Regulations (GDPR), and the fast-approaching implementation deadline for the California Consumer Privacy Act (CCPA).…