On July 20, 2015, in Remijas v. Neiman Marcus Group, LLC, No. 14-3122 (7th Cir. 2015), the Seventh Circuit held that the United States District Court for the Northern
Continue Reading The Seventh Circuit Sides with Plaintiffs in Data Breach Litigation
Data Theft
The Anatomy of a Cyber Attack: Prevention, Response and Postmortem (Part 2 of 6)
This is the second installment in a seven-part discussion on the best practices to prevent a cyberattack. The first part discussed four critical steps to prepare a business in the case of a cyberattack. These included: (1) identifying the crucial assets and functions a business, (2) creating an Response Plan, (3) installing the appropriate technology, and (4) obtaining authority for network monitoring. This article builds on those steps by suggesting further best practices in order to prevent a cyberattack.
Continue Reading The Anatomy of a Cyber Attack: Prevention, Response and Postmortem (Part 2 of 6)
The Anatomy of a Cyber Attack: Prevention, Response and Postmortem (Part 1 of 6)
Cyber-attacks can impact any business regardless of size, sector, or level of cyber security. The best way to minimize damages from a cyber-attack is to plan ahead and prepare for a possible attack. Forward thinking can minimize damages and shorten the process of recovery from a cyber-attack. The following suggestions are important steps that every business should take to prepare for a cyber-attack.
Continue Reading The Anatomy of a Cyber Attack: Prevention, Response and Postmortem (Part 1 of 6)
Purdue Notifies 7,000 Students of SSN Theft 16 Months After Discovering the Breach
Purdue University informed 7,093 former students on Monday that their Social Security numbers may have been stolen from servers at the University on April 5, 2010, representing a 16 month delay in notification.
Continue Reading Purdue Notifies 7,000 Students of SSN Theft 16 Months After Discovering the Breach
HACKED: 75,000 Social Security Numbers at Risk at University of Wisconsin
The University of Wisconsin-Milwaukee (“UWM”) announced on Wednesday that a malware-infected, university server was discovered on May 25th that allowed hackers, apparently seeking research data, to access several types of scanned documents. Included in the potentially accessed documents were student applications from past and present students, which applications contained Social Security numbers.
Continue Reading HACKED: 75,000 Social Security Numbers at Risk at University of Wisconsin
Health Data for 1.7 Million NYC Hospital Patients, Staff and Others At Risk
On February 10, 2011, the New York City public hospital system filed a lawsuit against its records management contractor over allegations that the contractor permitted the theft of unencrypted data…
Continue Reading Health Data for 1.7 Million NYC Hospital Patients, Staff and Others At Risk
California’s Simitian Moves to Bolster Data Breach Notices
California State Senator, Joe Simitian (D-Palo Alto), who authored the state’s existing data breach law in 2002, has introduced Senate Bill 24 to strengthen the content of notices provided to…
Continue Reading California’s Simitian Moves to Bolster Data Breach Notices
Gawker Media Hack Highlights Our Terrible Password Practices
The recent hacking of Gawker Media’s servers and subsequent release of nearly one and one-half million user names, email addresses and passwords has put a new spotlight on two particular brands of web users: The One Password User and The Terrible Password User.
Continue Reading Gawker Media Hack Highlights Our Terrible Password Practices
Emerging Employee/Employer Tensions in the Facebook Era
With the ever-growing popularity of social networking sites, and with so many employees exercising poor judgment online, it’s easy to understand why employers are concerned about the messages and …
Continue Reading Emerging Employee/Employer Tensions in the Facebook Era
Tony Soprano Goes Into the Business of Stealing Personal Information
Organized crime has been known as a group responsible for trading in stolen, personally identifiable information. The recent 2010 Verizon Data Breach Investigations Report reports that organized criminals were responsible for 85% of all data breaches caused by external agents. As a whole, data breaches caused by external agents comprise 70% of all data breaches, and 98% of all record compromised. Statistics, analysis and recommendations pepper the 66-page report.
Continue Reading Tony Soprano Goes Into the Business of Stealing Personal Information