Privacy Risk Report


identity theft

Connecting the Alleged Russian Hacks to Practical Hacktivism Concerns

It is probably old news to our readers that the 2016 U.S. Presidential Election may have been impacted by Russian cyber attacks. However, it may not be immediately clear if these large-scale political attacks will shed any light on cyber security concerns… Continue Reading →

First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls

To overcome his anxiety with flying, IOActive’s researcher/author, Ruben Santamarta, began “spending some flights hacking stuff.” In his December 20, 2016 blog post, “In Flight Hacking Systems,” Santamarta describes how he  tried to gain a better understanding of the In-Flight Entertainment… Continue Reading →

The Rise of Ransomware and Cyberbullying Insurance

Over the last few years, cyber security has focused on incidents where there is no contact with the criminal. That is, a data breach would occur and the criminal would be long gone before the victim knew there was an… Continue Reading →

Anatomy of a Cyber Fraud Incident: Recent Fraud Impacts Company’s Bottom Line Within a Few Weeks

Cyber incidents are an unfortunate common occurrence in today’s marketplace and can negatively impact a company’s bottom line. A recent cyber incident shows just how quickly that can happen. In January 2016, there were a number of reports concerning a cyber… Continue Reading →

Phish and Chips: Retailers Face New Liability For Fraud Committed With New Chip Credit Cards

Many consumers are finding new EMV (Europay Mastercard Visa) credit cards in their mailboxes to replace their old credit cards with a magnetic strip on the back. EMV cards are commonly referred to as “chip cards” and are intended to cut down on… Continue Reading →

Hackers See You When You’re Sleeping–Hackers Know When You’re Awake: Major Data Breach Involving Children’s Information and Pictures Calls Smart Toys Further Into Question

As we go into the holiday shopping season, many questions arise about whether “smart toys,” which store sensitive data regarding children, are secure from hackers. Children are high-valued targets for hackers because they have clean credit reports and their credit histories likely… Continue Reading →

Todd Rowe Authors Article For ABA’s Fall 2015 TortSource: Insurers and Policyholders Face Confusion in the Cyber Insurance Marketplace

Todd M. Rowe authored the article, “Insurers and Policyholders Face Confusion in the Cyber Marketplace,” for the Fall 2015 edition of the American Bar Association’s TortSource. In an effort to address an audience that has extensive knowledge of the insurance… Continue Reading →

Illinois Appellate Court Decision Does Not Adopt Seventh Circuit’s Reasoning in Data Breach Case

On August 6, 2015, the Illinois Court of Appeals issued its opinion in Maglio v. Advocate Health and Hosp. Corp., dismissing the complaints filed in two class action lawsuits seeking damages related to a theft of Advocate Health’s computers containing information… Continue Reading →

Seventh Circuit Weighs In on Article III Standing for Data Breach Plaintiffs

On July 20, 2015, the U.S. Court of Appeals for the Seventh Circuit issued its decision in Remijas v. Neiman Marcus Group, LLC, directly addressing Article III of the U.S. Constitution, the standing for data breach plaintiffs. The issue of… Continue Reading →

Another Court Dismisses Data Breach Class Action on 12(b)(1) Standing Grounds

In a case of first impression within the Fifth Circuit, a district court has dismissed a putative class action complaint brought after a data breach against one of the larger health organizations operating in California and Texas. In Peters v. St…. Continue Reading →

© 2024 Tressler LLPDisclaimer | Privacy Policy

Tressler Blog Network Bad Faith BulletinCGL DispatchCondo Law WatchLocal Government LowdownThe Property LineSpecialty Lines Advisory