News & Analysis as of

Identity Theft Cybersecurity Social Security Numbers

Foster Swift Collins & Smith

Digital Dupe: How to Protect Against Identity Theft After Death

In the digital age, identity theft has taken on new and sinister forms, extending beyond the living to the deceased. When a loved one passes away, their identity doesn’t simply vanish; it lingers in both the digital realm and...more

Lerman Senter PLLC

FCC Expands Data Breach Notification Requirements

Lerman Senter PLLC on

The FCC has significantly expanded telecommunications carriers’ data breach notification and reporting obligations. Telecommunications carriers, including Voice over Internet Protocol (VoIP) services, and telecommunications...more

Bass, Berry & Sims PLC

Privacy Perils: The Real Threat of Synthetic Identity Fraud

Bass, Berry & Sims PLC on

Synthetic identity fraud (SIF) is a recent phenomenon that scammers have used to circumvent the increasing awareness of traditional identity fraud. Instead of stealing a real person’s identity as with traditional identity...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 4: Recognize Identity Theft

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Robinson+Cole Data Privacy + Security Insider

2.6 Million Atrium Health Patient Records Compromised by Vendor AccuDoc

Atrium Health and its vendor AccuDoc Solutions have released a joint announcement this week that AccuDoc’s database of 2.6 million billing records of Atrium Health’s patients has been compromised by a hacking incident....more

Robinson+Cole Data Privacy + Security Insider

The Importance of Protecting the Last Four Digits of Your Social Security Number

We all know that it is important to protect our social security number. But sometimes companies still try to use the last four digits of our social security numbers as identifiers or to verify identity in some way....more

K&L Gates LLP

Phishing Season Opens for 2016 Tax Filings – Beware of “W-2 Phishing Scams”

K&L Gates LLP on

Tax season brings many headaches, but none as miserable as sophisticated scammer efforts to steal employee W-2 information. Using social engineering and modest technological tools, a “spear phishing” attack seeks to trick...more

Robinson+Cole Data Privacy + Security Insider

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

Robinson+Cole Data Privacy + Security Insider

Weekly Privacy Tip# 2 – Protecting your (and your employees’ and customers’) Social Security numbers

Social Security numbers are one of the highest risk data elements known to mankind. A Social Security number in combination with a name and date of birth (which are publicly accessible) in the hands of a bad person can...more

Mintz - Privacy & Cybersecurity Viewpoints

On the Fifth Day of Privacy, California (and Delaware) gave to me

sing it with me now…. Five Golden Rules…….(well, five new privacy laws/requirements) There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more

Dorsey & Whitney LLP

California Privacy Laws Change: Identity Theft Prevention and Mitigation Services

Dorsey & Whitney LLP on

Continuing the trend of changes in state breach notification and related laws, Cal. A.B. 1710 amends California's breach notification, security procedures, and Social Security number (SSN) laws in the wake of significant data...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide