Remove 2020 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

DLA Piper Privacy Matters - Untitled Article

DLA Piper Privacy Matters

Expert opinion on US surveillance laws highlights FISA risk for data transfers to the US. Under Section 702, the US Attorney General and Director of National Intelligence may issue directives compelling US electronic communication service providers (ECSPs) to provide such information. By: Andrew Serwin, Carol A.F.

article thumbnail

FERC Approves NERC’s Supply Chain Risk Management Reliability Standards and Directs NERC to Expand Their Scope

Data Matters

FERC also used the rule to direct NERC to expand scope of the Reliability Standards so that they covered Electronic Access Control and Monitoring Systems (“EACMS”) associated with medium and high impact bulk electric system (“BES”) Cyber Systems. Procedural History.

Risk 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). Authors: Raf Schoefs , Simon Verschaeve , Laetitia Mouton.

article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The Verizon DBIR 2020 report indicates that financially motivated attacks against retailers have moved away from Point of Sale (POS) devices and controllers, towards web applications. Source: Verizon DBIR 2020. Fraud and scams move to the web. Figure 1: Web application breaches in the Retail industry. Stolen credentials.

Security 143
article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

In an amendment to the EU’s 2014 Radio Equipment Directive (RED), the European Commission noted that as wireless devices, from mobile phones to fitness trackers to smart watches, become increasingly embedded into everyday consumer and business life, they also become a greater security risk. percent over the same period in 2020, with 313.2

IoT 109
article thumbnail

Four Times Self-Collection Went Wrong

eDiscovery Daily

However, there are several risks involved. Judge Matthewman granted the defendants a second chance but required both parties to collaborate in a robust meet and confer. Only one employee oversaw the collection process, and he described himself in court as “computer illiterate.” Over a year after the case ended, Green v.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Here we’ll discuss the most significant risks posed by 5G, how U.S. Table of Contents What Are the Cybersecurity Risks of 5G? How is 5G Different?

Risk 137