In California, the stalking laws are included under Section 646.9 of the Penal Code, which states that any person who willfully and maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her…
Articles Posted in Cybersecurity
SEC States Companies Should Disclose Cyber Attacks in Filings
The Securities and Exchange Commission stated that publicly-traded companies should disclose the threat and potential impact of cyber attacks that pose a risk to their investors. The commission made its comments in a letter to Senator Jay Rockefeller, chairman of the Senate Commerce Committee, that was released on June 8,…
Should the United States Plan for a Smarter Defense Against Cyber-Villains
The threats from cyberspace grow more powerful and pernicious. Companies like Sony Corporation, Google Inc., and Lockheed Martin have admitted startling security lapses. The International Monetary Fund, last month suffered a breach leading to the loss of highly sensitive data. The United States Congress and executive branch agencies face approximately…
The Data Security and Breach Notification Act of 2010
The Data Security and Breach Notification Act of 2010 To help protect personal information on the Internet and elsewhere, California enacted seminal legislation in 2000, which was significantly strengthened with the passage of SB 1386 in 2002. Since then, other states have enacted similar legislation. State activity, however, may be…
Cybersecurity Emergency and Presidential Powers
Our nation can be threatened not only by physical attacks on terra firma, but also in Cyberspace. Indeed, Cyber attacks could threaten all sorts of mission critical systems. For this reason, aides to Senator Jay Rockefeller reportedly have been working recently on a revised draft Senate bill that would give…
India eyes Google and Skype in security crackdown
Associated Press: India may ask Google and Skype for greater access to encrypted information once it resolves security concerns with BlackBerrys, which are now under threat of a ban, according to a government document and two people familiar with the discussions. The 2008 terror attacks in Mumbai, which were coordinated…
FBI’s access to e-mail and Web data raises privacy fears
WASHINGTON ,— Invasion of privacy in the Internet age. Expanding the reach of law enforcement to snoop on e-mail traffic or on Web surfing. Those are among the criticisms being aimed at the FBI as it tries to update a key surveillance law. With its proposed amendment, is the Obama…
WikiLeaks Does Not Know The Source of Leaked Data
WikiLeaks’ chief claims his organization doesn’t know who sent it some 91,000 secret U.S. military documents, telling journalists that the website is set up to hide the source of its data from those who receive it. Editor-in-chief Julian Assange says the added layer of secrecy helps protect the site’s sources…
NSA Cyber-security Program Details Revealed
In response to a report in the Wall Street Journal, the National Security Agency revealed some information about its plans for “Perfect Citizen,” which it described as a research and engineering effort around vulnerability assessment and capabilities development. The National Security Agency revealed some information about the nature of its…
Cyber-Security Insurance
Many Companies Continue to Ignore the Issue (Pittsburgh Post-Gazette, 22 June 2010) – After a year of high-tech breaches at some of the nation’s biggest companies, a provision in a Senate bill calls on the White House to encourage a market for cybersecurity insurance to protect businesses from debilitating costs…