Caregivers in Cybersecurity — Unauthorized Access Podcast
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Ross Is Boss — Unauthorized Access Podcast
Unauthorized Access Returns With "Get to Know Joe" — Unauthorized Access Podcast
Panel Pursuit: The Ins and Outs of Becoming a Preferred Panel Vendor - Unauthorized Access Podcast
Dark Web Monitoring - Unauthorized Access Podcast
Unauthorized Access: An Inside Look at Incident Response
In today's fast-paced corporate environment, in-house legal and privacy teams are under immense pressure to navigate the complexities of eDiscovery. With organizations generating massive volumes of electronic data daily, the...more
Restaurant, bar, club and tavern owners around the United States need to make sure they are properly licensing boxing fights for commercial usage before broadcasting the fight in their establishments. There are several...more
Ryanair recently prevailed in a jury trial in Delaware Federal District Court when the jury determined that Booking.Com B.V. violated the U.S. Computer Fraud and Abuse Act (CFAA) by engaging in "screen scraping" of data...more
On July 18, 2024, a federal jury in Delaware found that an online travel booking company violated the Computer Fraud and Abuse Act (CFAA) by accessing portions of a European airline’s website without permission and “with...more
Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more
Business account takeover (“ATO”) fraud occurs where a threat actor gains access to a business account on a payments platform (e.g., a payroll or accounts payable tool) or fraudulently creates such an account and engages in...more
Unauthorized Access, our privacy and cybersecurity-focused podcast, spotlights the human side of the cybersecurity industry. In this episode, Sadia welcomes Sherri Davidoff, CEO of LMG Security, to discuss the challenges and...more
In the world of real estate, ensuring the safety and security of homes during the selling process is of paramount importance. One of the key challenges facing Ohio Realtors is the potential risk of unauthorized access to...more
Late last year, Chegg Inc. (“Chegg”), an online learning platform, obtained a preliminary injunction based on allegations that the various operators of the Homeworkify website (“Defendants”) – which allows users to view...more
Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more
Recently, in United States v. Osage Wind, LLC, the Northern District of Oklahoma awarded permanent injunctive relief in favor of the Osage Nation and the United States against wind turbine farm developers in the form of...more
A well-known idiom - widely credited to Ben Franklin in the 1700s - is that an ounce of prevention is worth a pound of cure. Yet, few companies actively train their personnel to recognize the risk of a trade secret...more
Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing. In...more
A proposed bill in Congress aims to regulate the creation and use of digital replicas of human beings. The draft bill is called The Nurture Originals, Foster Art, and Keep Entertainment Safe Act, (“NO FAKES Act”). It was...more
On October 18, 2023, the Department of Health and Human Services (DHHS) through the Office for Civil Rights (OCR) issued an update1 containing two resource documents to help educate patients regarding privacy and security...more
It’s official! The Unauthorized Access podcast has returned, now with a slightly different spin. Our monthly podcast will spotlight the human aspect of cybersecurity, bringing you closer to the remarkable personalities...more
The Federal Trade Commission has approved an amendment to the Safeguards Rule under the Gramm-Leach-Bliley Act that creates a new data privacy regulatory reporting requirement for non-banking financial entities. Covered...more
Discovering unauthorized persons on your farm is a growing problem. Such unauthorized entry could include media news teams filming farm operations, environmental activists seeking to identify violations of various water...more
The Major League Baseball (MLB) Postseason is underway, and the World Series will start on October 27, 2023. Your station may want to conduct promotions that are tied to the baseball championships. These promotions can be...more
This notice signals the Copyright Office’s continued interest in the questions raised by generative AI in the copyright space and offers an opportunity for stakeholders to provide feedback on whether legislative or regulatory...more
This article is the first in our three-part series focused on data privacy considerations related to the use of Artificial Intelligence (AI) and machine learning. This first article highlights privacy topics related to the...more
On June 21, the Department of Homeland Security (DHS) published a final rule to implement security measures that safeguard controlled unclassified information (CUI) from unauthorized access and disclosure and improve incident...more
In 2018, an investment professional sued the firm he co-founded for wrongful termination and federal privacy law violations associated with the former employer’s remote accessing into a desktop computer it had purchased for...more
2022 provided companies with further clarity and insight regarding legal claims that might be viable to stop data (or web) scraping and those that likely won’t work. Data scraping continues to become an increasingly popular...more
A Minnesota federal district court has held that a software company is entitled to coverage for losses related to diverted billing emails under its business interruption coverage, rejecting the insurer’s argument that the...more