News & Analysis as of

Data Protection Authentication

Nelson Mullins Riley & Scarborough LLP

[Webinar] Keeping Up With and Staying Ahead of FCC Actions on Data Privacy and Security - October 22nd, 12:00 pm - 1:00 pm EDT

Carriers have an obligation to protect customer proprietary network information (CPNI) and personally identifiable information (PI). Several recent FCC consent decrees resolving breaches of CPNI and PI show the FCC will hold...more

CloudNine

Data Authentication in eDiscovery: Ensuring Integrity and Trust

CloudNine on

The Role of Experts in Data Collection - In many eDiscovery cases, teams of experts handle the collection of traditional and modern data following a proven, standard process. These experts ensure the data is authenticated,...more

Lerman Senter PLLC

All Providers Must Submit Expanded Filing in Robocall Mitigation Database by February 26, 2024

Lerman Senter PLLC on

The Federal Communications Commission has set a February 26, 2024 filing deadline for all providers in the call chain, regardless of STIR/SHAKEN status or whether they have the facilities to implement STIR/SHAKEN, to file...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles | Episode X | Biometrics - the Ticket to Flying High or a Turbulent Ride for Authentication?

Feeling seen, but maybe too seen - Stepping off the plane this past August after a long international flight, the last thing I wanted was a lengthy wait at US Customs, the final sentinel between me and a good night’s sleep. I...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Ankura's Data & Technology Leader for APAC, Chris Marks and Data & Technology Leader for Greater China, Han...

Ankura's Data & Technology Leader for APAC, Chris Marks and Data & Technology Leader for Greater China, Han Lai, in Hong Kong & Shanghai respectively, sit down with Kaylee & Mary to talk about how they found their feet on...more

Manatt, Phelps & Phillips, LLP

Improved Method for Overcoming Hacking by Turning On and Off Authentication Held Patent Eligible

In CosmoKey Solutions GMBH & Co. KG v. Duo Security LLC, the Federal Circuit held that an improved method for overcoming computer hacking by turning on and off the authentication process was patent eligible. The court held...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #318 – IRS Abandons Use of Facial Recognition for New Accounts

The Internal Revenue Service previously announced in November 2021, that it would use facial recognition technology offered by ID.me to authenticate taxpayers before using any online services the IRS provides, including...more

Clark Hill PLC

Biometric Authentication: The Good, the Bad, and the Ugly

Clark Hill PLC on

TV and movies introduced biometric identification as a futuristic concept ages ago. Security on Star Trek was cutting edge with voice ID making sure the right personnel were in command of the Enterprise. Facial recognition,...more

Farrell Fritz, P.C.

The Invaluable Benefits Of Multi-Factor Authentication

Farrell Fritz, P.C. on

The need to input a username and password when logging into a computer is a “single factor” authentication. But, from a security perspective, that single factor authentication only goes so far. Consider, for example, the...more

BCLP

FINRA Reminds Broker-Dealers of their Obligations to Safeguard Customer Information and to Build Controls Designed to Protect...

BCLP on

Key Takeaways: ..According to FINRA, the number of reported instances involving broker-dealer fraudulent account takeovers (ATO) and related theft is on the rise. ..As set forth in recently released FINRA Regulatory...more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

Jones Day

Strong Customer Authentication in the United States: When, Not If

Jones Day on

The Situation: Although the deadline keeps getting extended, e-commerce merchants and payment processors across the European Union are racing to implement the strong customer authentication ("SCA") requirements of the Revised...more

Society of Corporate Compliance and Ethics...

GDPR enforcement actions: UK and Germany

Report on Supply Chain Compliance 3, no. 2 (January 23, 2020) - Two recent enforcement actions shed light on how regulators will enforce GDPR provisions going forward. In one case, the United Kingdom’s Information...more

Bass, Berry & Sims PLC

Privacy Perils: Refresher Course in Good Password Hygiene, Part 1

Bass, Berry & Sims PLC on

To prepare for and in honor of National Change Your Password Day (NCYPD) on February 1, we are providing a refresher course in good password hygiene. (Look back at prior Privacy Perils.) NCYPD is only one of at least three...more

BCLP

Privacy FAQs: Can an application use facial recognition technology to authenticate a user under the GDPR?

BCLP on

The California Consumer Privacy Act ("CCPA") was enacted in early 2018 as a political compromise to stave off a poorly drafted, and plaintiff’s friendly ballot initiative. Although the CCPA is scheduled to go into force in...more

Robinson+Cole Data Privacy + Security Insider

Closing The Door Behind Your MFA Implementation

I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more

Stoel Rives - Global Privacy & Security Blog®

New tool released that may allow bad actors with almost any skill set to bypass many implementations of Two-Factor Authentication...

Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more

Benesch

Password Protection Made Easy

Benesch on

You hear it time and time again. You need complicated passwords to protect your personal/private information. You may think that you don’t have that much private information, but, then again, consider the number of credit...more

Robinson+Cole Data Privacy + Security Insider

The Latest Hack into a Smart Home Camera – Another Reason to Use Two Factor Authentication

Sometimes I feel like I’m the Grinch at a party when I talk shop about the latest massive data breach or horrible hacker story that is in the news. We say things like, “it’s not if, but when” there will be another data...more

BCLP

Passwords

BCLP on

Many consumers, and many employees, have dozens of passwords for access to different systems, services, networks, device, and terminals. From a corporate perspective, many companies have at least two policies that impact...more

McManis Faulkner

Hackers are Vampires - Keep Them from Feeding on Your Private Information

McManis Faulkner on

According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Passwords Are Getting Ridiculous, Right? Consider Simplifying Your Company's Two-Factor Authentication With A Physical Security...

If you clicked on this post, that means you probably fall into one of two categories. Category 1: You are really tired of having to come up with – and remember – increasingly more complicated passwords, only to then be asked...more

Seyfarth Shaw LLP

Biometrics & Blockchain in the Workplace: A Primer

Seyfarth Shaw LLP on

Information is everywhere, especially in the workplace. But traditional means of securing and sharing data—which typically involve accessing password protected information from various sources—is inefficient, cumbersome, and...more

Bennett Jones LLP

Top 10 Tips for Cybersecurity Employee Training

Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

BCLP

How Employers Can Become Experts at Data Breaches: Unauthorized authentication of employee accounts

BCLP on

Service providers that permit your employees to establish a user name and/or password in order to log-into an online portal often monitor employee accounts for indications that an unauthorized person has obtained an...more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide