Blog Archives

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings.  The caller ID says it’s your attorney’s office.  When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number.  When you call the number, you are told how

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Security, Privacy

Cyber-Security Alert: D.C. Area Hospital Chain MedStar Targeted By Hackers

MedStar, a Washington, D.C.-area hospital chain, became the latest healthcare industry victim of a cyber-attack when hackers breached its systems with a crippling virus. MedStar operates 10 hospitals in the D.C./Baltimore region, employs 30,000 staff, has 6,000 affiliated physicians, and

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Data Security, HIPAA, Privacy

SuperValu Latest in Debate over Standing

Last month, a Minnesota federal judge tossed out extensive multidistrict legislation concerning a proposed class action of SuperValu shoppers. Shoppers from Illinois, Minnesota, and Idaho had alleged that the supermarket chain caused them harm when hackers penetrated SuperValu’s systems and

Tagged with: , , , , ,
Posted in Cyberattack, Data Breach, Litigation

Chris Correa Isn’t Billy Beane and This Isn’t Moneyball

The lights going on and off within the head of former St. Louis Cardinals scouting director Chris Correa were once probably flickering more actively than the lights inside of The Staples Center just before the Los Angeles Lakers take to

Tagged with: , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Data Security, Privacy, Standards

The Elephant in the Room – Catastrophic Property Damage from a Cyber Attack

Much of what we discuss in this blog relates to the loss of information and the legal and regulatory framework that exists to address individual privacy concerns following a data breach.  However, as our colleague Dick Bennett points out in

Posted in Cyberattack, Data Breach, Data Security

Insider Trading Hack was Cinematic in Scope

The U.S. Department of Justice announced indictments in Brooklyn and New Jersey last month of 32 people for fraudulently obtaining inside information and then using that knowledge to make millions in the market, in the “largest scheme of its kind

Posted in Cyberattack, Data Breach, Data Security

U.S. Appeals Court Upholds the FTC’s Authority to Police Cybersecurity Practices

In a highly anticipated and precedential opinion issued earlier this week, the Third Circuit Court of Appeals upheld the FTC’s authority to regulate corporate cybersecurity. The decision in Federal Trade Commission v Wyndham Worldwide Corp et al., addressed whether the FTC has

Posted in Cyberattack, Data Breach, Litigation, Regulations, Standards

Ashley Madison Reveals Even More: Hacking May Be An Inside Job

In recent years, hacking has infiltrated the retail industry. Hacking has infiltrated the healthcare industry. Hacking has infiltrated the sports industry. And now, hacking has now infiltrated the most personal (some would say immoral) activities we engage in on the Internet.  Last week,

Posted in Cyberattack, Data Breach, Data Security, Privacy

Who’s on First? And Who Stole a Base?

America’s oldest pastime has had a series of tech problems lately, ranging from the humorous to the scandalous. In a recent game, the Philadelphia Phillies could not call the bullpen for a new pitcher because the phone was off the

Posted in Cyberattack, Social Media

Another Health Plan Hit By Massive CyberAttack and Class Actions Follow

Coming fresh off the heels of the Anthem data breach Premera Blue Cross announced on March 17th that it was the victim of a “sophisticated” cyberattack that may have exposed the personal information of approximately 11 million of its members.  Premera has approximately

Posted in Cyberattack, Data Breach, Data Security, Litigation, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Receive Email Updates

Email:

Cozen O’Connor Blogs