Cybersecurity & Tech
Miami Herald | Cyberattacks can cripple the construction industry
What White House Proposal on data security affecting health care? On May 25, 2016 the White House released its final Data Security Policy Principles and Framework (Security Framework) for President Obama’s Precision Medicine Initiative (PMI).
What are the goals of the White House data security proposal?
What requirements do the goals translate into?
White House | Precision Medicine Initiative and Data Security
White House | PMI Security Principles
Who: Federal Trade Commission
What: Amendments to how companies disclose privacy policies & information to consumers
When: Begins this fall
Standard of Review: The FTC favors corporate disclosures to consumers that are:
The Hill | Consumer protection agency to look at disclosure issues
Who sits on State Cyber Security Commissions?
What are the goals of State Cyber Security Commissions?
4 Point Checklist for State Cyber Security Commissions:
State Scoop | As more governors convene cyber commissions, questions arise over effectiveness
The Hill | Financial industry spars with retailers over data breach bill
The Hill | Retailers battle financial sector over data breach legislation
“Learning to be Watched: Surveillance Culture at School” report published by the National Center for Education Policy at the University of Colorado at Boulder finds:
District Administration | CIO News | 31 states introduce student data privacy bills
4 Key Pieces of Intel from how strong data security laws protect businesses:
TechCrunch | Startups to Congress: Strong data security keeps us competitive
Who are the targets of Connecticut’s student data privacy bill?
What will be required of education vendors?
Additional requirements specific to online vendors and contractors:
Which entity promulgated the new federal contracting rule? Federal Acquisition Regulations (“FAR”) Council
Which data security rule for contractors are we talking about? Basic Safeguarding of Contractor Information Systems
Which contracts will be hit by the new rule?
All contractors, and affected subcontractors will be required to meet 15 safeguards:
Lexology | Wilmer Cutler Pickering Hale and Dorr LLP | Final Government Contractor Basic Data Security Rule Issued
Performing due diligence on all data and security protocols when selecting and monitoring vendors;
Developing privacy provisions for contracts with TPAs and other service providers over and above standard confidentiality agreements;
Limiting access to sensitive information to necessary personnel;
Training personnel on the law and the fiduciary responsibilities;
Developing written policies and procedures detailing for personnel the applicable state and federal laws;
Continuing to monitor and watch over service providers with access to sensitive data.
National Law Review | Jackson Lewis P.C. | Employee Benefit Plans and Data Security Issues
The FDIC announced on May 9th, 2 new data security initiatives:
Bloomberg BNA | FDIC Takes New Initiative on Data Security Following Breaches
Executive GOV | FDIC Plans New Security Measures After Retroactive Data Breach Report
Will this be a legislative trend? Yes, because sextorition is not a crime. Individuals are charged under usual hacking crimes.
How does sextortion differ from ransomware?
Who are the victims?
Georgia Attorney General at the National Association of Attorneys General said:
“I frankly think it’s absurd that there are 30 or 40 different state laws on cybersecurity and breach.”
Reed Smith LLP | Georgia Attorney General Supports Federal Data Breach Standard
In 2015, New Jersey expanded its data breach laws to apply to include these health care information holders that service New Jersey patients:
New Jersey also adopted new encryption standards that:
What personal information must be protected by encryption?
A first name, or first initial and last name linked with at least one of the following:
(1) Social Security number
(2) driver’s license number or other state identification card number
(3) address, or
(4) identifiable health information
New Jersey law Examiner | Consumer protection for healthcare data breaches in New Jersey
The FBI advice for ransomeware attacks, which hold a businesses data hostage for a ransom:
DO NOT PAY THE RANSOM.
Refresh my memory, what are some of these ransomeware attacks? Several hospitals in California have had their systems frozen by ransomeware, forcing a move to manual paper hospital administration. The ransoms have been as small as $8,000.
Which appellate court are we talking about? 7th Circuit
What did they do to keep a data breech law suit alive? held that the threat of impending future harm from a data breach was enough to keep a data breach lawsuit alive
Lexology | Seventh Circuit Reinstates Data Breach Suit Against P.F. Chang’s
Which state is considering new health care data breach laws? California
What health companies are the targets of new data security laws? wearable devices and consumer-facing apps that track health data like steps taken, heart rate, etc…
Read the bill: California Assembly Bill 2688
The bill’s highlights:
Business’ concerns: Support privacy, concerned about overreach by government
Privacy Advocate concerns: Seek to require the devices to comply with California’s Confidentiality of Medical Information Act.
The Recorder | Lawmakers Sweat Details of Consumer Health Privacy
Which Attorney General announced a 40% increase in data breach notifications? New York Attorney General Eric T. Schneiderman
Why does the state A.G. track data breach notifications? In NY, businesses must notify the A.G. of a data breach and the A.G. assists in reaching consumers
Has the state improved efficiency for businesses reporting data breaches? Yes, the state moved to an electronic, web-based reporting system
Hudson Valley News Network | A.G. Announces Record Data Breach Notifications
Wall Street Journal | Data Breaches Rise While Companies Struggle With Detection
Michigan is proposing life in prison for someone who is convicted of either:
Tech.Mic | Get Caught Hacking a Car and You Could Get Life in Prison, Thanks to Proposed Bill
Your informed intel:
Which state is making a move to cloud computing that is triggering data security issues and new procurement opportunities? Arizona
What procurement opportunities does the move trigger?
Which data security standards will be required? All new procurement contracts and state data centers will have to meet standards contained in:
Health Insurance Portability and Accountability Act standards
the Family Educational Rights and Privacy Act guidelines
the FBI’s Criminal Justice Information Services strictures
State Scoop: Arizona lawmakers advance bill to spur statewide cloud migration
Why is there a data security issue with 3rd party tax collectors? 3rd party tax collectors receive taxpayer information from taxing jurisdictions
Why is does this raise data security risks? data theft is on the rise & businesses aren’t keeping up with data security protocols to protect taxpayer information
Accounting Today | Saying No to Outside Agencies in Tax Collections
An Office of Inspector General, Security Concerns, and health care contractors– Sound like a familiar mix?
Which health care contractors is the HHS OIG looking into? Medicare administrative contractors
What is the data security concern that is raised? the number of health care data gaps is INCREASING
Healthcare Dive | OIG report: More data security gaps at Medicare administrative contractors
Let’s peak into the Electronic Payments Coalition:
Electronic Payments Coalition- who are they?
What’s the point of the EPC?
What’s the EPC saying about the federal Data Security Act of 2015 (H.R. 2205)?
EPC | EPC SUPPORTS COMMONSENSE MEASURES TO PROTECT CONSUMER DATA
What 4 Ways does the Health & Human Services Data Protection Act protect health care data?
Health IT Security | Healthcare Cybersecurity Bill Introduced for HHS Operations
What is the question answered by Attorney General Opinion KP-0076? Whether Bowie County can engage a private company to use a license plate reader data looking for vehicles that don’t have liability insurance?
Is there a fee splitting arangement in this scenario? Yes, the vehcile owner will get a letter from the District Attorney office, and fees will be split 50-50 between the County and the company.
Can this fee splitting arrangement with automatic license plate readers work? No.
What is the statutory solution to make automatic license plate readers ok for counties? Counties need specific authority for the “use of automated photographic or similar technology to enforce the state’s vehicle financial responsibility laws. “
What does the Attorney General analysis look like? Its a laundry list of all the uses for photo enforcement in Texas. The highlights:
Retailers and Financial Institutions are like the Hatfields & the McCoys when it comes to federal data security legislation.
Here’s what you need to know when this fight comes to your state legislature:
The Hill | Retailers battle financial sector over data breach legislation
What group is calling for improved state data security systems? National Association of State Chief Information Officers
What sparked the call to arms? the cost of cyber crime world wide is $375 billion to $575 billion, which is labled a threat to democracy
What do the NASCIO propose states do? Create statewide cybersecurity ecosystem
What would a statewide cybersecurity ecosystem link?
state government
local government
federal government
higher education
K-12 education
nonprofits
industry – all sectors
sector specific information sharing and analysis centers
critical infrastructure providers: electric, water, natural gas, waste water treatment
transportation: all modes
critical supply chains
NASCIO | Advanced Cyber Analytics | April 2016
Politico | Morning CyberSecurity | STATES PUSHED TO UPGRADE CYBER ANALYTICS
WHO WAS CONVICTED: A woman in Pennsylvania reported her rape to the police
WHAT EVIDENCE LED TO CONVICTION: When police came to the scene, they collected as evidence the woman’s fitbit found laying in a hallway
WHY DID THE EVIDENCE INDICATE GUILT: The woman claimed she had gone to sleep and was later attacked, but the data downloaded from the Fitbit indicated the woman was walking about at the time and logged her heart rate
Wall Street Journal | Prosecutors Say Fitbit Device Exposed Fibbing in Rape Case
No. Nien. Nyett. Nej. A federal judge ruled that people caught in the data breach at Ashley Madison cannot remain anonymous.
Why did these plaintiffs want to be anonymous? Fear of the impact to the professional and personal lives.
Why did the court deny the request? Because the data breach is not equal to instances when a person can remain anonymous. Those instances are reserved for minors, rape, or other highly sensitive matters.
Washington Post | People suing Ashley Madison for last year’s hack can’t be anonymous, judge rules
A poll commissioned by The App Association reveals a distrust of government on data security issues.
The informed intel:
The Hill | Poll: Voters trust tech companies ahead of FBI on data security
The Credit Union National Association proposed the following changes to credit card processing in Texas to improve data security:
Credit Union National Association | Texas House committee hears CU’s data breach concerns
Which state jumped on the enanced data breach notification law bandwagon? Nebraska
What 3 changes did Nebraska make to its data breach laws?
Where did the ride share data report originate? UBER produced its first ever transparency report
The numbers of data requests from July 2015 to December 2015:
WallStreet Journal | Are California’s New Data Security Standards a Recipe for Liability?
Which legislative body is considering data security from the angle of improving existing computer infrastructure in government? Congress
What’s the cost associated with modernizing government computers? $ 3.1 Billion.
Bonjour procurement opportunities.
What’s the argument supporting infrastructure investment? “If we do not invest in our technology and cybersecurity now, we will have no one to blame for the next data breach but ourselves,” Rep. Ted Lieu (D-Calif.)
How will the funding operate?
The Hill | House Dem stumps for Obama’s tech modernization push
What have state courts been saying across the country about data breach insurance? General Liability policies don’t cover data breaches
What happened this week to alter this legal trend? The U.S. Fourth Circuit Court of Appeals in Virginia found that a ageneral liability policy covered a data breach
What does the insurance company say? The 4th Circuit Court of Appeals got it wrong. General liability policy that covered “electronic publication of material” with “unreasonable publicity” is not a data breach policy
SC Magazine | Federal court bucks trend, rules general liability insurance covers data breach
What state legislature considered a bill to fine companies that do not decrypt after receiving a court order? California
What happened to this bill to fine companies? Died in committee without a vote
What did opponents to the bill say?
Who supports the bill? law enforcement
Who opposes the bill? Civil libertarians and tech companies
California Assembly Bill 1681
When did Dallas County have a data breach? In December 2015, it came to light that Dallas County had left personally identifiable information from 10s of 1000s accessible online for more than a decade.
How much does an average data breech cost to remediate? $80 per record. If it exposed 50,000 records that is a $4 million remediation minimum.
How does the remediation cost cover for Dallas County?
Legal Intelligencer | Cybersecurity Threats Pose Big Risks for Local Governments
The Hill | Encryption bill draft worries tech community
CNET | Encryption bill would force companies to surrender user data
University of Washington Today | UW law students lay groundwork for new state privacy office
CloudPassage has a new report on cybersecurity and high education institutions. Here’s the big picutre:
Why the lack of focus on cyber or data security among undergrads?
SC Magazine | Cybersecurity being overlooked by American universities: Report
In Legislative Appropriation Request Trends:
In 2015’s State Budget:
(1) Department of Aging and Disability Services;
(2) Department of Assistive and Rehabilitative Services;
(3) Department of Family and Protective Services;
(4) Department of State Health Services;
(5) Health and Human Services Commission;
(6) Higher Education Coordinating Board;
(7) Office of Court Administration;
(8) Parks and Wildlife Department;
(9) Department of Insurance; and
(10) Department of Licensing and Regulation.
Strategy A.1.3, Statewide Security for DIR funding for statewide security policy & procedures
Strategy C.2.2.NetworkandTelecommunicationsSecurityServices
Strategy B.3.1, Statewide Cyber Security Services for DIR risk managment & 3rd party security assessments
LBB | Overview of Cybersecurity Provisions in the 2016-17 General Appropriations Act
Health insurance and health data sells for 60 to 70 times what social security numbers sell for on the black market.
IT Portal Pro | Why your medical information is gold for hackers
Health IT Security | Are State Health Data Breach Notification Laws Needed?
What state recently enacted new telemedicine laws? Washington State
What data security elements were included in the Washington State legislation?
Davis Wright Tremaine LLP | M.D. Phone Home: New Legislation Expands Telemedicine in Washington
Hacking incidents by industry:
34% of healthcare data breaches are caused by employee error
The average notification timeline after a breach:
Health IT Security | Healthcare Data Breaches Most Common in 2015 Incidents
Which state is making a new move to protect student data? Colorado
What does it mean for education contractors? New Rules. New Data Security Requirements.
3 Key prohibitions in the bill:
Chalkbeat Colorado | Colorado lawmakers try again to tighten protection of student data
Which state updated its data breach law in March to shorten the time line for notification? Tennessee
How long do Tennessee businesses with data breaches have for notification? 14 days from discovery or notification of the breach
Is there an exception to the 14 days? yes, a legitimate law enforcement need
Did Tennessee also expand what triggers a notification? Yes
What new event triggers a notification? When the breach is caused by your own employee
JD Supra | Alston & Bird | Tennessee Updates Data Breach Statute to Require Notice in 14 Days
Which state passed new data security laws in 2016? Wyoming
Were the new laws the result of a breach or a legislative mandate? The result of a 2 year, 4-member Joint Task Force on Digital Information Privacy
What are agencies asked to do? 2 tasks
Where does procurement come into play? To fix and protect the data in perpetuity as state and local governmental entities determine industry best practices. Any wagers on whether government currently implements best practices protect data?
Wyoming Tribune Eagle | Law requires state agencies take 2nd look at data security
What entity released guidelines on teleworking and cyber security? The National Institute of Standards and Technology
What suggestions in the guidelines that will direct procurement opportunities?
virtual mobile infrastructure technologies
that create temporary, secure environments for teleworkers who need to access organizational data that are destroyed when the session is over
Fed Scoop | NIST issues draft cybersecurity guidelines for teleworking
Krebs on Security | Hospital Declares ‘Internal State of Emergency’ After Ransomware Infection
KOAM 7 | AIA Statement on House Homeland Security Committee Hearing on the Role of Cyber Insurance
Why are wireless mice vulnerable to hacking? Unencrypted communication with computers is what guide the mice.
What does that mean? For $20, someone a block away can trick your computer into using its mouse and steal your data.
Why would regulators care? Because regulators stress encryption in data security.
Reuters | Wireless mice leave billions at risk of computer hack: cyber security firm
What entities are the new targets for data security enforcement? HIPPA adjacent health and wellness companies.
Why are HIPPA adjacent health and wellness companies the focus of regulators? These companies collect and store personal health information. For example:
What kind of enforcement actions are being considered for this health care app data? Regulators are looking for reasonable & appropriate data storage and data security protection.
Health Data Management | FTC steps up protection of consumer health data
The U.S. Justice Department arrested invididuals that attempted to break into a small dam to disrupt operations. The informed intel:
Washington Post | U.S. charges Iran-linked hackers with targeting banks, N.Y. dam
What happened that led to a lawsuit? A health care network experienced a data breach, followed its internal protocols to handle the data breach.
What did the plaintiff’s allege that the health care network didn’t do that caused them harm? health network had violated the HITECH Act in protecting personal health information
What did the courts say? “There is no case law that suggests that an isolated privacy breach or discrete series of related breaches constitute a violation of the HITECH Act,” states the district court opinion. “Moreover, the Relator fails to allege that KHN failed to implement policies and procedures to address various security risks.”
What’s the take away? When a health care provider follows data breach protocols to protect health records, following those steps shows protections for health records.
Health IT Security | US Appeals Court Affirms FCA Healthcare Data Breach Case
What happened on University of California campuses to cause a UC hacker policy? In 2015 Hackers Broke into the UCLA Medical Center.
In response to the hack what policy did UC officials enact? UC installed data monitors that stores internet traffic on campuses for 30 days
Do faculty like this idea? No, UC has a policy dating back to the 1930s that providers for collaborative policy making in conjunction with faculty input. It’s all very Californian.
Did UC create a greater data security risk? Some say yes, because capturing and storing 30 days of university internet traffic is a treasure trove of data for hackers
Which UC official decided to install data collection monitors? Janet Napolitano, the university president and a former secretary of homeland security in the Obama administration
NPR | All Things Considered | At Calif. Campuses, A Test For Free Speech, Privacy And Cybersecurity
Who is touting new legislative approach to cyberstalking? Rep. Katherine Clark (D-Mass.)
What does her bill do?
SC Magazine | SXSW: Dem. lawmaker plans to introduce online harassment legislation
BuxxFeed | Congresswoman Unveils Plans To Prosecute Severe Online Threats Against Women
Data security of self-driving cars spurs calls for uniform data security standards for self-driving cars.
Have there been a push for self driving car regulations or statutes in Texas ? Yes, why yes, there has. 84R HB 933
Did those pushes include data security issues? No.
The Hill | Lawmakers worry about cyberattacks on self-driving cars
Wired | Thousands of Trucks, Buses, and Ambulances May Be Open to Hackers
What’s Congress’ new cybersecurity idea? To ” increase information sharing among the Homeland Security Department and state and local governments about cyber threats and vulnerabilities”
Whose idea is this? Congressman Will Hurd filed a bill in December 2015 & Sens. Gary Peters and David Perdue are introducing a bill in March 2016
Politico | Warner, McCaul and Obama talk tech in Austin
DATA SECURITY.
Emergency Management | Cybersecurity Tops County and City IT Director’s Concerns
Healthcare IT | How Recent Senate HELP Bills Affect Healthcare Data Security
Forbes | Worldwide Cybersecurity Spending Increasing To $170 Billion By 2020
What local governmental entity department was the newest target to hackers holding data for ransom? Durham, N.H., Police Department
How did the hackers do it? Attached a file to a email on a relevant police investigation that appeared to be fax file.
What did the police department do? Pay the ransom? Beat the ransom technology? The police department mitigated damage by recovering the locked files from a backup copy that hadn’t been infected. The department paid no ransom.
Is this an isolated example? No, these police departments have also been affected by ransomeware:
How has ransomeware grown in private sector? FBI says in 2014 the number of incidents grew 114%
Bloomberg BNA | Consumer Finance Agency Levies First Data Security Fine
National Law Review | Dwolla Fined $100,000 by CFPB in First Data Security Enforcement Action
Consent Order Between the Consumer Financial Protection Bureau and Dwolla
Who is issuing the warning? The Obama Adminsitration
What entities are being warned about data security threats?
What’s sparked the warning? The attack n the Ukraine’s power grid 2 months ago. It was the first cyberattack that produced a wide spread blackout
What was the target of the cyber attack? industrial control systems that act as the intermediary between computers and the switches
What could hackers do with control over industrial control systems?
New York Times | Utilities Cautioned About Potential for a Cyberattack After Ukraine’s
Which governmetnal entity is seeking contractors for data security? Department of Defense
What is the data security objective? $600 million in computer system for background checks
Can similar procument opportunities present itself in Texas? Absolutely, keep your eyes open and subscribed to informedintel.com
Reuters | Pentagon to tap private industry for background check IT system
What group issued this report? The Institute of Directors and is supported by Barclay’s
What did the report find the rate of businesses reporting data breaches? 1/3
What percentage of businesses maintained cybersecurity insurance? 20%
WSJ | Report Warns U.K. Businesses to ‘Get Real’ on Cyberattacks
AT&T.
The ad:
Help keep your agency’s information protected. Our proactive network-based approach to managed security delivers some of today’s most powerful weapons to combat cyber security attacks — helping to safeguard the elements of your IP infrastructure. To learn more about security solutions for your agency, please visit www.att.com/govsecurity.
Data security and new government agency leadership posts and new agencies go hand in hand.
Pending federal legislation would create the National Commission on Security and Technology Challenges.
Here’s the info you need abou the National Commission on Security and Technology Challenges:
Multichannel News | Encryption Commission Legislation Introduced
From where did this cyber security czar idea eminate? It was in the 2016 proposed federal budget from the White House. The feds had a gigantic data breach, so its time to fix it.
Are state’s picking up on a state cyber security czar position? Yes, including a proposal this week from California
What moves states to implement a state cyver security czar? Here’s what motivated California legislators:
The Recorder | Lawmakers Seek Fix for State’s Cybersecurity Woes
The Hill | IRS: Taxpayer breach much larger than previously reported
Drug Delivery Systems data is a new target and concern for data security.
Medical Device & Diagnostic Industry | The Data Revolution Comes to Drug Delivery
…hackers. Yes, that’s right 98% of the data breaches in 2015 that occured in health care were initiated by hackers.
That’s an 80% increase over 2014.
What is the intent of the hackers that seek health care information?
AJMC.com | Cyberattack on Hollywood Hospital Part of a Growing Trend
Stacey Napier will lead the Department of Information Resources as the its executive director beginning mid-March 2016.
Napier replaces Todd Kimbriel, the interim executive director of DIR.
An overview of her background:
Austin Business Journal | Texas names Capitol veteran as technology agency director
Spec’s experienced a data breach that resulted in legal fees. Spec’s was insured and has sued its insurer over the coverage of costs incurred from the data breach.
3 Take aways from a Texas Company with data breach insurance coverage:
The question for Texas, does holding business data hostage constitute a crime?
Where did data get held hostage? In California
How was the data held hostage? “malicious “ransomware” application to encrypt data on the hospital’s computer system, demanding payment in exchange for a decryption key”
What type of business? Hollywood Presbyterian Medical Center patient input information
What did the hackers want? $17,000 worth of bitcoin was paid to retrieve an encryption code.
Where patients harmed? No patient records or hospital care was impacted.
The Hill Ransomed hospital pays $17K to hackers to restore computer access
How much data has been gathered by license plate readers in Texas? Estimated 10 million license plate pictures, with locations, collected by month.
What can be done with this stored license plate information? It can track the location of a vehicle by plotting its sightings by day and time
What’s happening on this legislatively?
What happened to spark stronger student data privacy protections? A court allowed for the release of student data to a group of parents who are fighting a court battle over the quality of education for disabled students.
What data do legislators want to prevent schools from releasing?
What is the nobel purpose of the legislative action? Schools collect data that is neither required by law nor required for public education purposes
What data is being collected and sold by electronic devices? Smart televisions gather information about viewing habits and that data is sold to third parties .
Do owners of smart tvs know or have they consented to the data collection? According to a series of law suits, no, owners neitehr know of the data collection nor consent to it.
WFAA | Vizio’s smart TVs are snitches, lawsuit alleges
What class action is progressing? The suit involving the Anthem Inc. health breach that affected 97 million.
What did the judge do that allowed the class action to move forward? Rejected Anthem’s argument that a data breach is not a recognizeable injury
What does this mean? Courts have split on whether a data breach, with no proof that the stolen data has been used to cause a harm, is enough of an injury to satisfy a lawsuit. The California Judge’s order says it is enough of an injury for a lawsuit under New York’s General Business Law, similar to California’s Unfair Competition Law.
The Recorder | Judge Rejects Key Defense in Anthem Data-Breach Suits
Which Attorney General office analyzed state data security breaches? California
What is the most popular data to breach?
What recommendations to policymakers emerged?
Lake County News | State attorney general releases Data Breach Report; more than 49 million records compromised
Providing mechanisms to address a decedent’s online presence is a growing trend.
This sounds rather nerdy, why is it important to a corporate client? Because the state may tell your client what it can and cannot do with customer data.
So, what state is now wading into this territory? Wyoming
What could happen with data at death?
Government Technology | Data Protection, Privacy Bills Make their Way Through Wyoming State House
What regulation proposals are floating around related to connected cars and data security?
Which executive is proposing a new cabinet level position to coordinate cybersecurity? President Obama’s proposed budget includes the creation of “new high-level federal official to coordinate cybersecurity across civilian agencies and to work with military and intelligence counterparts”
Is there a new cyber security plan? Yes, the “Cybersecurity National Action Plan”
What’s the goal? build a cohesive, broad federal cybersecurity response that will:
What will the new position do?
Top Tech News | Obama Administration Plans New High-Level Cyber Official
Wall Street Journal | White House Proposes New Cybersecurity Plan
What do the feds want to stop the state legislatures from doing? barring the manufacture and sale of unbreakably encrypted smartphones
Why does this matter? California and New York have pending legislation to bar the manufacturing and sale of unbreakably encrypted smartphones.
Why would the state want to prevent unbreakably encrypted smnartphones? Law enforcement wants access to smart phone data.
What groups are involved in this policy fight? tech companies v. law enforcement
The Recorder | Bill Would Bar Encryption Measures at State Level
The Virginia legislature is considering the Government Data Collection and Dissemination Practices Act which would:
The Hewlett Foundation has a $65 million initiative in cyber security.
Robert and Renee Belfer just added $15 million for the Belfer Center for Science and International Affairs at Harvard’s Kennedy School to establish the Cyber Security Project.
Inside Philanthropy | Meet a Wealthy Family That Cares About Cybersecurity
Minnesota wants to do a better job protecting student data privacy. Here’s what the land of 10,000 lakes is proposing in its House Bill 2386:
New Jersey Legislature is considering SB 808 that would:
National Law Review | Top 10 for 2016 – Happy Data Privacy Day
The Hill | Calif. bill would ban fully encrypted smartphones
The IRS has ruled that businesses can go tax free for credit monitoring & identity theft protection services that:
national law review | Tax Benefit for Early Cybersecurity Protections
4 Key points to know now:
The Hill | Critics urge lawmakers to repeal recently passed cyber law
California Assembly has a new committee to handle privacy and technology issues. What’s the committee jurisdiction?
The Recorder | Calif. Lawmaker Forecasts Busy Year in Privacy
Thank you for subscribing to our newsletter.
Great things are just around the corner!