Reasonable Cybersecurity Measures for Protection After collecting personal information, businesses must take “reasonable measures” to safeguard it. Some states, such as Florida and Alabama, have this standard (or a similar one) in their cybersecurity statutes. On the federal level, the Federal Trade Commission has brought numerous enforcement actions against companies for engaging in “unfair” cybersecurity […]
For the Threat of Cybercrime, Get a Cyber Liability Policy If cybercrime were a nation state, it would be the world’s 13th-largest by GDP, just ahead of Australia. The threat of cybercrime can take many forms – from hijacking sensitive robotics to holding consumer data at ransom – and the impact to your operation (and […]
Understand the Stakes of Collecting Personal Information Cybersecurity law has been called many things in recent years—evolving, complex, varied, cutting-edge, even hilarious. Ok, maybe not the last one. But I would offer another phrase that can serve as a key takeaway from this article. This phrase also highlights the importance of strong cybersecurity from a […]
The New Rules of Data Privacy and Protection You’ve probably heard the letters GDPR everywhere lately. “What do they mean and why do I have to care?” is probably your common response. This article seeks to provide you with an overview of the new data privacy and protection regime that will help you answer both […]
Directors must protect their shareholders’ tangible and intangible assets, regardless of the form of the threat. Directors need to initiate protective actions and provide on-going oversight for cybersecurity.
Like most things, the so-called Intellectual Property clause isn’t as clear as we’d like. Experts often refer to this clause as the patent and copyright clause, because “science and useful arts” refer only to patented and copyrighted creations.
Intellectual property and cybersecurity affect our lives more than most people are aware. Learning the basics of both provides a unique perspective on just how much both topics influence the world around us and help color the decisions we make — from business decisions to financial decisions to the use of technology in our personal lives. This column hopes to teach readers the basics of intellectual property and cybersecurity through real world examples.
Having your identity stolen can ruin your business or your life, so learn these Life Hack tips to help you protect your passwords and keep your identity safe: