article thumbnail

What Counts as “Good Faith Security Research?”

Krebs on Security

Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. In a statemen t about the changes, Deputy Attorney General Lisa O.

Security 277
article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. See Indiana v. Informatics Eng’g, Inc. , 3:18-cv-00969 (N.D.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

France: the CNIL has released its annual dawn raid Program for 2023: four national priorities and one priority coming from the EDPB!

DLA Piper Privacy Matters

As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). The CNIL will verify the conditions of appointment and modalities of exercise of the DPO function. management of data subjects’ rights).

article thumbnail

Data Protection: Where’s the Brexit Privacy Dividend?

Data Protector

Removing the UK from the decision-making structures of the EU should also result in the UK Government feeling able to update other privacy legislation, such as the outdated Privacy & Electronic Communications Regulations, without having to delay for years and years until EU countries managed to reach a political consensus on the way ahead.

Privacy 156
article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

Some of the data that it covers are: Electronic health records Billing details Health insurance information The Importance of Compliance There are severe consequences to not abiding by the HIPAA rules. For example, if a hospital’s computer system isn’t regularly updated, it can be more vulnerable to security and cyber attacks.

article thumbnail

Security Affairs newsletter Round 210 – News of the week

Security Affairs

Romanian duo convicted of fraud Scheme infecting 400,000 computers. Locked Shields 2019 – Chapeau, France wins Cyber Defence Exercise. RCE flaw in Electronic Arts Origin client exposes gamers to hack. Attackers hacked support agent to access Microsoft Outlook email accounts. Whatsapp, Instagram, Facebook down worldwide.

article thumbnail

U.S. Supreme Court to Weigh in on Extraterritorial Search Warrant Dispute

Data Matters

The decision now under review held that electronic communications that are stored exclusively on foreign servers cannot be reached by U.S. In a concurring opinion, Judge Lynch urged Congress to revise the SCA and adopt a “more complex balancing exercise” in place of the “all-or-nothing” approach that emerged from the court’s analysis.