Did someone steal your tax return? You are not alone. Indeed, the rise in tax-related identity theft has been well documented. In 2015, the FTC reported a 50% increase in identity theft complaints. A primary cause for that increase was the rise in tax-related identity theft. In response to this increase, the IRS has made stopping identity theft and refund fraud a top priority. From 2011-2014, the IRS reported that it stopped 19 million suspicious returns and protected more than $63 billion in fraudulent returns. … More
A recent survey from the credit score company FICO has some interesting numbers on the prevalence of cyber insurance in the US.
- 50% of US companies have no cyber insurance.
- 74% of US healthcare companies have no cyber insurance.
- 27% of US companies say they have no future plans to acquire cyber insurance.
Today, you can expect the more traditional types of business insurance,… More
A mere month and a half after the WannaCry strain of ransomware caused major havoc in European and Asian countries, another major ransomware attack hit large institutions across Europe and the United States yesterday. Hardest hit has been Ukraine, which has seen major attacks on its government, banks, and power infrastructure. Other European firms such as Germany’s Deutsche Bahn railways and Danish shipping firm A.P.… More
On June 21, 2017, the FTC updated its COPPA Compliance Guidance for businesses. The new guidance includes new descriptions of services and products covered by COPPA, and new methods for obtaining parental consent.
Though the guidance is new, the subjects of the guidance generally are not; for example, “internet-enabled location-based services” have long been within the ambit of COPPA because geolocation information has long been part of the definition of “personal information” of children that COPPA regulates.… More
Our speakers will provide insights into some of the most significant Cybersecurity challenges facing businesses and government today, including:
- Evolving threats to how businesses & government operate
- Insider threats and what that means for the future
- Importance of being prepared and protected
- The cost of cyber crime
- Ed Davis,…
In the wake of several executive orders on immigration, ICE—the federal agency responsible for enforcing the nation’s immigration laws—has ramped up enforcement activities. As a result, local public school districts and health care providers in Massachusetts have asked the Attorney General about their rights and obligations with respect to the undocumented students and patients they serve. On May 22, 2017, the AG issued comprehensive guidance to answer their questions.… More
Emmanuel Macron won France’s presidential election in a landslide. He defeated his opponent, Marine Le Pen, by more than thirty percentage points. Such a high margin might lead one to think that his victory was inevitable. But on the eve of the election, it did not seem that way.
On the Friday before the Sunday election, hackers released a trove of documents they had stolen from the Macron campaign.… More
Unmanned aerial vehicles, or “drones,” as they’re commonly called, touch on numerous hot-button cybersecurity issues. As devices connected to networks, they are important when considering the “internet of things.” As used by the government, they present surveillance concerns. Over the past decade, they have been increasingly used for military operations — although civilian drones now far outnumber military drones. (The FAA has estimated that by 2020,… More
Recently, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 477, which aims to provide guidance and clarity to lawyers as they consider what level of security to give communications with clients. (I was recently interviewed by Massachusetts Lawyers Weekly on this topic, and you can read the full article here; please note that the article is behind a paywall.)
The bottom line? … More
Presented by Foley Hoag LLP and PwC
A data breach is a business crisis. What should you do?
Learn first-hand as Foley Hoag LLP and PwC walk you through the practical and legal aspects of responding to a data security incident. From understanding how to be prepared to thinking through best practices, this webinar is designed to help you get a handle on an emergency that every business must confront.
- Douglas Bloom, Director, Cybersecurity and Forensics, PwC
- Christopher Escobedo Hart, Counsel, Foley Hoag LLP
- Stephen Bychowski, Associate, Foley Hoag LLP
Click here to download a copy of the materials.