July 24, 2023
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
On July 18, 2023, the Illinois Supreme Court denied a rehearing on the issue of Biometric Information Privacy Act (BIPA) accrual. The request for rehearing derived from an opinion by the 7th Circuit, Cothron v. White Castle System, Inc., 20 F.4th 1156 (7th Cir. 2021), holding that “separate claims accrue... Read More
June 27, 2023
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Key takeaway: Despite the Supreme Court’s recent pronouncement of patent-eligible subject matter, cybersecurity innovation will remain an active area for intellectual property protection through the patent application and prosecution process. Because cybersecurity protection is of critical importance to businesses, it has become commonplace, resulting in a fundamental impact on other... Read More
May 31, 2023
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
Takeaway: On both a federal and state level, there has been a concerted push to protect employee privacy more thoroughly. As the law continues to develop or, as in the case of the NLRB, new methods of enforcement come into play, employers must balance the desire to monitor employee activity... Read More
April 11, 2023
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
On March 15, 2023, the United States Securities and Exchange Commission (SEC) took a major step towards strengthening cybersecurity in the financial sector by proposing three new rules. These rules aim to improve privacy, data security, and compliance measures while addressing the growing need for transparency in the constantly evolving... Read More
December 1, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
Takeaway: Hackers cannot be underestimated, and companies need to take cybersecurity policy seriously. Earlier this year, a massive Twitter data breach occurred. Researchers are learning that the data breach was significantly more severe than initially reported. In the first reports, one hacker was suspected of exploiting a vulnerability within the... Read More
November 8, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Quintin DiLucente
Takeaway: When a cybersecurity-related incident occurs, an insured should not automatically assume a standard commercial general liability (CGL) policy issued by an insurer will cover their losses, as CGL policies generally afford coverage to an insured for losses resulting from bodily injury and property damage. An insured’s cybersecurity losses can... Read More
October 21, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
Takeaway: Security labels on internet-connected devices are on the horizon for companies that manufacture and want to sell such devices worldwide. Last week, the White House National Security Council announced plans for a consumer products cybersecurity labeling program aimed at improving digital safeguards on internet-connected devices. On October 19, 2022,... Read More
October 6, 2022
Blog, Cyber Security, Insights & Impact Business Blog, The Privacy Hacks
By:
Mary Kate McDevitt
Takeaway: The latest directive from CISA will enhance federal agencies’ ability to identify vulnerabilities in their networks to prevent and respond to cybersecurity incidents. On October 3, 2022 the Cybersecurity and Infrastructure Security Agency (CISA) announced Binding Operational Directive (BOD) 23-01 entitled Improving Asset Visibility and Vulnerability Detection on Federal... Read More
September 14, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
, Quintin DiLucente
Takeaway: In many data breach cases, a cybersecurity expert may evaluate whether the company’s security measures were reasonable and appropriate or, alternatively, if the company lacked the requisite technology to detect a breach. In some circumstances, however, a party’s proposed expert may be challenged on the basis of unfair prejudice.... Read More
September 7, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
Takeaway: CISA and CGYBER recommend all organizations who did not immediately apply available patches to assume Log4Shell compromise and initiate threat hunting activities. In December 2021, the world was held hostage by hackers who found certain vulnerabilities in Log4Shell and exploited them. As part of this exploitation, suspected and advanced... Read More