Computers and computing activities play an increasingly integral role in daily life in America, affecting our financial activity, social interactions, and more. With an increased level of dependence on networked devices comes the risk of theft, or even attacks, on and through our computer networks. While the business community has…
Articles Posted in Cybersecurity
New Laws and Guidelines on Cybersecurity Disclosures Both Protect and Endanger Personal Information
When hackers breached the e-commerce firm Zappos in January, they may have compromised the personal information of as many as 24 million users. Legislatures in several states, including California, have responded to attacks such as this one by passing laws enhancing cybersecurity investigation and enforcement, and increasing requirements for disclosure…
California Cyber Stalking and Harassment Laws
In California, the stalking laws are included under Section 646.9 of the Penal Code, which states that any person who willfully and maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her…
SEC States Companies Should Disclose Cyber Attacks in Filings
The Securities and Exchange Commission stated that publicly-traded companies should disclose the threat and potential impact of cyber attacks that pose a risk to their investors. The commission made its comments in a letter to Senator Jay Rockefeller, chairman of the Senate Commerce Committee, that was released on June 8,…
Should the United States Plan for a Smarter Defense Against Cyber-Villains
The threats from cyberspace grow more powerful and pernicious. Companies like Sony Corporation, Google Inc., and Lockheed Martin have admitted startling security lapses. The International Monetary Fund, last month suffered a breach leading to the loss of highly sensitive data. The United States Congress and executive branch agencies face approximately…
The Data Security and Breach Notification Act of 2010
The Data Security and Breach Notification Act of 2010 To help protect personal information on the Internet and elsewhere, California enacted seminal legislation in 2000, which was significantly strengthened with the passage of SB 1386 in 2002. Since then, other states have enacted similar legislation. State activity, however, may be…
Cybersecurity Emergency and Presidential Powers
Our nation can be threatened not only by physical attacks on terra firma, but also in Cyberspace. Indeed, Cyber attacks could threaten all sorts of mission critical systems. For this reason, aides to Senator Jay Rockefeller reportedly have been working recently on a revised draft Senate bill that would give…
India eyes Google and Skype in security crackdown
Associated Press: India may ask Google and Skype for greater access to encrypted information once it resolves security concerns with BlackBerrys, which are now under threat of a ban, according to a government document and two people familiar with the discussions. The 2008 terror attacks in Mumbai, which were coordinated…
FBI’s access to e-mail and Web data raises privacy fears
WASHINGTON ,— Invasion of privacy in the Internet age. Expanding the reach of law enforcement to snoop on e-mail traffic or on Web surfing. Those are among the criticisms being aimed at the FBI as it tries to update a key surveillance law. With its proposed amendment, is the Obama…
WikiLeaks Does Not Know The Source of Leaked Data
WikiLeaks’ chief claims his organization doesn’t know who sent it some 91,000 secret U.S. military documents, telling journalists that the website is set up to hide the source of its data from those who receive it. Editor-in-chief Julian Assange says the added layer of secrecy helps protect the site’s sources…