Cybersecurity & Tech
Which regulatory leader wants comprehensive data security laws? The FTC Chairwoman Edith Ramirez
Why the push for data security laws?
Daily Dashboard | FTC’s Ramirez calls for comprehensive data security laws
Top business sector for data breach complaints: Finance
Have data security laws led to more enforcement actions?
What benefit of data security laws is highlighted? breach notification to impacted customers
Information Age | The financial data divide: regulations are not having the desired effect
The state: New York
The NY State Agency: New York Comptroller
The School District: Avon School District
The Avon School District’s data security failings:
Livingston County News | State faults Avon schools’ lack of data security policies
Which state added curriculum changes in its student data protection laws? Delaware
What changes ere made to public school curriculum? data security training
Why train teachers and students on data security? because human error is the largest driver of data breaches
Bonjour to Canada’s Privacy Commission who oversees the data privacy of Canadians.
The Privacy Commissioner recommended these changes to national data security laws for 2016:
Data security breach reporting should include:
Which state passed student data protection bills in 2016? Colorado
What does the new legislation cover?
JD Supra | Thompson Coburn LLP| Colorado jumps into student data privacy protection with new privacy law
Colorado joins 35 states that have passed student data protection laws in the last 2 years.
JD Supra | Thompson Coburn LLP| Colorado jumps into student data privacy protection with new privacy law
Connecticut passed student data privacy legislation in 2016.
A group of mothers who started the push for student data privacy reform are touting its benefits:
Easton Courier | Legislation will protect student data privacy
What groups are concerned by model student data privacy laws? 24+ civil liberties and advocacy organizations
What’s the model act called? Employee and Student Online Privacy Protection Act
The privacy concerns about the model act:
broad and vague
does not prevent school administrators & employers from coercing or requiring students and employees to turn over highly sensitive social media account information
violates the Fourth or Fifth Amendment
Why do health and services entities need to pay more attention to ransomware?
Gov Info Security | Congressmen: Ransomware Requires New Guidance
Concerns related to maintaining data collection: Make certain the state collects enough data necessary to improve schools
Concerns to protect student data from voucher schools: Student data must be protected from “voucher schools” that would use the data to advertise to public school students
Milwaukee Star Tribune | Legislators to study how to protect student data
The state: Minnesota
The approach to student data protection: Recommendations for the 2017-2018 Minnesoata Legislature
The focus: 3 Points of focus:
Milwaukee Star Tribune | Legislators to study how to protect student data
The State: North Carolina
The cybersecurity apprenticeship qualifications:
State coop | North Carolina moves closer to creating cyber apprenticeship program for disabled vets
Augusta Free Press | Warner calls on FTC to protect children’s data security
What type of schalarly research is hitting against anti-hacking laws?
How do they run afoul with anti-hacking laws? The researchers generate faux profiles on the websites they are researching
WallStreet Journal | First Amendment Suit Claims Anti-Hacking Law Criminalizes Scholarly Research
The key tort issue in data breaches: whether the consumer has been injured
What’s the argument if hackers have your information isn’t that a harm to a consumer? Some courts say yes, other courts say no.
Where are cases proceeding where the harm of the data breach is only having your personal information hacked? Judges in California, Illinois and other states
Wallstreet Journal | For Consumers, Injury Is Hard to Prove in Data-Breach Cases
How? Via laptop theives can open doors, and start an ignition to steal late model cars prompting new laws against auto manufacturers to secure vehicle data
Is this in Texas? Yes. Houston has recorded theft of a 2010 Jeep
Which manufacturers are targeted? Known hacks of autombilies are of Fiat Chrysler, GM and Tesla vehicles
American Banker | What’s the Biggest Threat to Data Security?
Citizens in the UK dislike both the European Union and Businesses that have data breaches.
An overwhelming majority supporting fining businesses & the recommendation has made it to Parliament.
Computer Weekly | UK consumers support fines for firms that lose personal data
UK Parliament | Cyber Security: Protection of Personal Data Online
Out with PINS in with biometric identifiers to access banking information.
Why switch from PIN numbers to biometrics at financial institutions?
New York Times | DealB%k | Goodbye, Password. Banks Opt to Scan Fingers and Faces Instead.
Pymnts.com | Procurement Is Ground Zero For Cybersecurity Protection
Which school district was affected by an internal hack? Abingdon-Avon School District, IL
Who is thought to have hacked the school district internally? The Head of its IT
The purported purpose? Changing grades
The state law charges? 3 felony counts of Eavesdropping
KWQC | Abingdon-Avon employee arrested in relation to data breach
What campaign related voter information was hacked? Voter files compiled by L2, a political data brokerage, but hacked from a client (campaign) that left the voter information unprotected on a cloud
What type of voter information was exposed? names, addresses, political preferences and opinions on social issues
Where were the hackers? Serbia or routed through Serbia
The Federal Trade Commission publishes “Start with Security: A Guide for Business” & offers these recommendations for business:
Are all data breaches electronic? No, hard copies of personal information are still sources of data breaches.
Are there examples of major data breaches that were based on hard paper copies? Yes. For example:
Do data breach laws discuss paper records? No, not all. The Federal laws and these 8 states have added paper records to their data breach statutes:
Why Illinois updated its data security laws? To make the laws more consistent with technology
What additional personal information is covered by data breach law?
How will businesses be able to notify consumers of a breach? By email
Cook County Record | New IL legislation updates data breach law to cover more tech, speed required consumer notifications
According to the author of The Car Hacker’s Handbook, the data your car collects is more valuable to hackers than taking over control of your vehicle.
Tech Crunch | The Car Hacker’s Handbook digs into automotive data security
Ponemon Institute released its annual data breach informatics. The cost of an average daa breach has risen to $7 million.
Law 360 | Data Breach Costs Rise To $7M Per Incident, Study Says
Which financial entity is facing an SEC fine for a data breach? Morgan Stanley
How much is the SEC fine? $1,000,000
What was the data breach? Security measures failed to prevent an employee from transfering account information to a private server that was hacked
What do federal rules require of financial entities? policies and procedures that are reasonably designed to protect customer data
The Hill | Morgan Stanley to pay $1M SEC fine for data breach
What government is requiring authorization from the governing body before a purchase of surveillance equipment can be made? Santa Clara County deep on Silicon Valley
Which police purchases will require approval? Any law enforcement purchase of new surveillance technologies. e.g.:
What entities can approve the police technology? County board and district attorney approval are required
Why require approval before law enforcement buys technology?
Are there other requirements for surveillance equipment? Yes, law enforcement is required to:
The Hill | California county becomes first to restrict surveillance technology
Data Security is the 1 key element missing from the 7 states that have passed self driving car laws.
Cars can be hacked. Cars contain data. The data your car’s computers contain can be used for:
California is addressing vehicle data via regulation by requiring:
The Guardian | Self-driving cars: overlooking data privacy is a car crash waiting to happen
IT Pro Portal | Why four-year-old data is more valuable than you think
What cyber security threat could be helped by old school methods? Electric Grid Security
Who is proposing old school solutions? 4 U.S. Senators: King, Heinrich, Risch, Collins
What does the legislation call for?
The Hill | Senate bill would encourage ‘retro’ grid security approach
What is civic hacking? hackers doing good to solve governmental problems
How does it work? The feds listed 16 issues that it needs helps with and called for a National Day of Civic Hacking. Examples include:
Which school district experienced a data breach of its W-2 data, and all data retlated to persons who have received payment from the school district? Concord, N.H.
When did the breach occur? April
How did the breach occur? Social engineering, a targeted approach in which the hacker masquerades as the superintendent soliciting information
Did the data breach result in the information being used? Yes, false tax returns were filed based on the hacked information
When did the school district discover the data breach? June 1st
When did the school district notify persons that their personal information was compromised? June 3rd
What 3 things did the notification suggest people do to protect their information?
What is ransomware? A data security attack that freezes computer data, but leaves the business, such as a hospital, otherwise functioning so that services are not disrupted. A ransom is asked for and in exchange the data is liberated.
What statutes are states amending? Computer crimes to apply extortion to computer violations
What specific statutory tweaks is California considering after ransomware attacks at California hospitals?
Health IT Security | How Ransomware Affects Hospital Data Security
3 pieces of ransomware intel critical to hospital data security:
Health IT Security | How Ransomware Affects Hospital Data Security
The equation for a data breach of NFL records:
Miami Herald | Cyberattacks can cripple the construction industry
What White House Proposal on data security affecting health care? On May 25, 2016 the White House released its final Data Security Policy Principles and Framework (Security Framework) for President Obama’s Precision Medicine Initiative (PMI).
What are the goals of the White House data security proposal?
What requirements do the goals translate into?
White House | Precision Medicine Initiative and Data Security
White House | PMI Security Principles
Who: Federal Trade Commission
What: Amendments to how companies disclose privacy policies & information to consumers
When: Begins this fall
Standard of Review: The FTC favors corporate disclosures to consumers that are:
The Hill | Consumer protection agency to look at disclosure issues
Who sits on State Cyber Security Commissions?
What are the goals of State Cyber Security Commissions?
4 Point Checklist for State Cyber Security Commissions:
State Scoop | As more governors convene cyber commissions, questions arise over effectiveness
The Hill | Financial industry spars with retailers over data breach bill
The Hill | Retailers battle financial sector over data breach legislation
“Learning to be Watched: Surveillance Culture at School” report published by the National Center for Education Policy at the University of Colorado at Boulder finds:
District Administration | CIO News | 31 states introduce student data privacy bills
4 Key Pieces of Intel from how strong data security laws protect businesses:
TechCrunch | Startups to Congress: Strong data security keeps us competitive
Who are the targets of Connecticut’s student data privacy bill?
What will be required of education vendors?
Additional requirements specific to online vendors and contractors:
Which entity promulgated the new federal contracting rule? Federal Acquisition Regulations (“FAR”) Council
Which data security rule for contractors are we talking about? Basic Safeguarding of Contractor Information Systems
Which contracts will be hit by the new rule?
All contractors, and affected subcontractors will be required to meet 15 safeguards:
Lexology | Wilmer Cutler Pickering Hale and Dorr LLP | Final Government Contractor Basic Data Security Rule Issued
Performing due diligence on all data and security protocols when selecting and monitoring vendors;
Developing privacy provisions for contracts with TPAs and other service providers over and above standard confidentiality agreements;
Limiting access to sensitive information to necessary personnel;
Training personnel on the law and the fiduciary responsibilities;
Developing written policies and procedures detailing for personnel the applicable state and federal laws;
Continuing to monitor and watch over service providers with access to sensitive data.
National Law Review | Jackson Lewis P.C. | Employee Benefit Plans and Data Security Issues
The FDIC announced on May 9th, 2 new data security initiatives:
Bloomberg BNA | FDIC Takes New Initiative on Data Security Following Breaches
Executive GOV | FDIC Plans New Security Measures After Retroactive Data Breach Report
Will this be a legislative trend? Yes, because sextorition is not a crime. Individuals are charged under usual hacking crimes.
How does sextortion differ from ransomware?
Who are the victims?
Georgia Attorney General at the National Association of Attorneys General said:
“I frankly think it’s absurd that there are 30 or 40 different state laws on cybersecurity and breach.”
Reed Smith LLP | Georgia Attorney General Supports Federal Data Breach Standard
In 2015, New Jersey expanded its data breach laws to apply to include these health care information holders that service New Jersey patients:
New Jersey also adopted new encryption standards that:
What personal information must be protected by encryption?
A first name, or first initial and last name linked with at least one of the following:
(1) Social Security number
(2) driver’s license number or other state identification card number
(3) address, or
(4) identifiable health information
New Jersey law Examiner | Consumer protection for healthcare data breaches in New Jersey
The FBI advice for ransomeware attacks, which hold a businesses data hostage for a ransom:
DO NOT PAY THE RANSOM.
Refresh my memory, what are some of these ransomeware attacks? Several hospitals in California have had their systems frozen by ransomeware, forcing a move to manual paper hospital administration. The ransoms have been as small as $8,000.
Which appellate court are we talking about? 7th Circuit
What did they do to keep a data breech law suit alive? held that the threat of impending future harm from a data breach was enough to keep a data breach lawsuit alive
Lexology | Seventh Circuit Reinstates Data Breach Suit Against P.F. Chang’s
Which state is considering new health care data breach laws? California
What health companies are the targets of new data security laws? wearable devices and consumer-facing apps that track health data like steps taken, heart rate, etc…
Read the bill: California Assembly Bill 2688
The bill’s highlights:
Business’ concerns: Support privacy, concerned about overreach by government
Privacy Advocate concerns: Seek to require the devices to comply with California’s Confidentiality of Medical Information Act.
The Recorder | Lawmakers Sweat Details of Consumer Health Privacy
Which Attorney General announced a 40% increase in data breach notifications? New York Attorney General Eric T. Schneiderman
Why does the state A.G. track data breach notifications? In NY, businesses must notify the A.G. of a data breach and the A.G. assists in reaching consumers
Has the state improved efficiency for businesses reporting data breaches? Yes, the state moved to an electronic, web-based reporting system
Hudson Valley News Network | A.G. Announces Record Data Breach Notifications
Wall Street Journal | Data Breaches Rise While Companies Struggle With Detection
Michigan is proposing life in prison for someone who is convicted of either:
Tech.Mic | Get Caught Hacking a Car and You Could Get Life in Prison, Thanks to Proposed Bill
Your informed intel:
Which state is making a move to cloud computing that is triggering data security issues and new procurement opportunities? Arizona
What procurement opportunities does the move trigger?
Which data security standards will be required? All new procurement contracts and state data centers will have to meet standards contained in:
Health Insurance Portability and Accountability Act standards
the Family Educational Rights and Privacy Act guidelines
the FBI’s Criminal Justice Information Services strictures
State Scoop: Arizona lawmakers advance bill to spur statewide cloud migration
Why is there a data security issue with 3rd party tax collectors? 3rd party tax collectors receive taxpayer information from taxing jurisdictions
Why is does this raise data security risks? data theft is on the rise & businesses aren’t keeping up with data security protocols to protect taxpayer information
Accounting Today | Saying No to Outside Agencies in Tax Collections
An Office of Inspector General, Security Concerns, and health care contractors– Sound like a familiar mix?
Which health care contractors is the HHS OIG looking into? Medicare administrative contractors
What is the data security concern that is raised? the number of health care data gaps is INCREASING
Healthcare Dive | OIG report: More data security gaps at Medicare administrative contractors
Let’s peak into the Electronic Payments Coalition:
Electronic Payments Coalition- who are they?
What’s the point of the EPC?
What’s the EPC saying about the federal Data Security Act of 2015 (H.R. 2205)?
EPC | EPC SUPPORTS COMMONSENSE MEASURES TO PROTECT CONSUMER DATA
What 4 Ways does the Health & Human Services Data Protection Act protect health care data?
Health IT Security | Healthcare Cybersecurity Bill Introduced for HHS Operations
What is the question answered by Attorney General Opinion KP-0076? Whether Bowie County can engage a private company to use a license plate reader data looking for vehicles that don’t have liability insurance?
Is there a fee splitting arangement in this scenario? Yes, the vehcile owner will get a letter from the District Attorney office, and fees will be split 50-50 between the County and the company.
Can this fee splitting arrangement with automatic license plate readers work? No.
What is the statutory solution to make automatic license plate readers ok for counties? Counties need specific authority for the “use of automated photographic or similar technology to enforce the state’s vehicle financial responsibility laws. “
What does the Attorney General analysis look like? Its a laundry list of all the uses for photo enforcement in Texas. The highlights:
Retailers and Financial Institutions are like the Hatfields & the McCoys when it comes to federal data security legislation.
Here’s what you need to know when this fight comes to your state legislature:
The Hill | Retailers battle financial sector over data breach legislation
What group is calling for improved state data security systems? National Association of State Chief Information Officers
What sparked the call to arms? the cost of cyber crime world wide is $375 billion to $575 billion, which is labled a threat to democracy
What do the NASCIO propose states do? Create statewide cybersecurity ecosystem
What would a statewide cybersecurity ecosystem link?
state government
local government
federal government
higher education
K-12 education
nonprofits
industry – all sectors
sector specific information sharing and analysis centers
critical infrastructure providers: electric, water, natural gas, waste water treatment
transportation: all modes
critical supply chains
NASCIO | Advanced Cyber Analytics | April 2016
Politico | Morning CyberSecurity | STATES PUSHED TO UPGRADE CYBER ANALYTICS
WHO WAS CONVICTED: A woman in Pennsylvania reported her rape to the police
WHAT EVIDENCE LED TO CONVICTION: When police came to the scene, they collected as evidence the woman’s fitbit found laying in a hallway
WHY DID THE EVIDENCE INDICATE GUILT: The woman claimed she had gone to sleep and was later attacked, but the data downloaded from the Fitbit indicated the woman was walking about at the time and logged her heart rate
Wall Street Journal | Prosecutors Say Fitbit Device Exposed Fibbing in Rape Case
No. Nien. Nyett. Nej. A federal judge ruled that people caught in the data breach at Ashley Madison cannot remain anonymous.
Why did these plaintiffs want to be anonymous? Fear of the impact to the professional and personal lives.
Why did the court deny the request? Because the data breach is not equal to instances when a person can remain anonymous. Those instances are reserved for minors, rape, or other highly sensitive matters.
Washington Post | People suing Ashley Madison for last year’s hack can’t be anonymous, judge rules
A poll commissioned by The App Association reveals a distrust of government on data security issues.
The informed intel:
The Hill | Poll: Voters trust tech companies ahead of FBI on data security
The Credit Union National Association proposed the following changes to credit card processing in Texas to improve data security:
Credit Union National Association | Texas House committee hears CU’s data breach concerns
Which state jumped on the enanced data breach notification law bandwagon? Nebraska
What 3 changes did Nebraska make to its data breach laws?
Where did the ride share data report originate? UBER produced its first ever transparency report
The numbers of data requests from July 2015 to December 2015:
WallStreet Journal | Are California’s New Data Security Standards a Recipe for Liability?
Which legislative body is considering data security from the angle of improving existing computer infrastructure in government? Congress
What’s the cost associated with modernizing government computers? $ 3.1 Billion.
Bonjour procurement opportunities.
What’s the argument supporting infrastructure investment? “If we do not invest in our technology and cybersecurity now, we will have no one to blame for the next data breach but ourselves,” Rep. Ted Lieu (D-Calif.)
How will the funding operate?
The Hill | House Dem stumps for Obama’s tech modernization push
What have state courts been saying across the country about data breach insurance? General Liability policies don’t cover data breaches
What happened this week to alter this legal trend? The U.S. Fourth Circuit Court of Appeals in Virginia found that a ageneral liability policy covered a data breach
What does the insurance company say? The 4th Circuit Court of Appeals got it wrong. General liability policy that covered “electronic publication of material” with “unreasonable publicity” is not a data breach policy
SC Magazine | Federal court bucks trend, rules general liability insurance covers data breach
What state legislature considered a bill to fine companies that do not decrypt after receiving a court order? California
What happened to this bill to fine companies? Died in committee without a vote
What did opponents to the bill say?
Who supports the bill? law enforcement
Who opposes the bill? Civil libertarians and tech companies
California Assembly Bill 1681
When did Dallas County have a data breach? In December 2015, it came to light that Dallas County had left personally identifiable information from 10s of 1000s accessible online for more than a decade.
How much does an average data breech cost to remediate? $80 per record. If it exposed 50,000 records that is a $4 million remediation minimum.
How does the remediation cost cover for Dallas County?
Legal Intelligencer | Cybersecurity Threats Pose Big Risks for Local Governments
The Hill | Encryption bill draft worries tech community
CNET | Encryption bill would force companies to surrender user data
University of Washington Today | UW law students lay groundwork for new state privacy office
CloudPassage has a new report on cybersecurity and high education institutions. Here’s the big picutre:
Why the lack of focus on cyber or data security among undergrads?
SC Magazine | Cybersecurity being overlooked by American universities: Report
In Legislative Appropriation Request Trends:
In 2015’s State Budget:
(1) Department of Aging and Disability Services;
(2) Department of Assistive and Rehabilitative Services;
(3) Department of Family and Protective Services;
(4) Department of State Health Services;
(5) Health and Human Services Commission;
(6) Higher Education Coordinating Board;
(7) Office of Court Administration;
(8) Parks and Wildlife Department;
(9) Department of Insurance; and
(10) Department of Licensing and Regulation.
Strategy A.1.3, Statewide Security for DIR funding for statewide security policy & procedures
Strategy C.2.2.NetworkandTelecommunicationsSecurityServices
Strategy B.3.1, Statewide Cyber Security Services for DIR risk managment & 3rd party security assessments
LBB | Overview of Cybersecurity Provisions in the 2016-17 General Appropriations Act
Health insurance and health data sells for 60 to 70 times what social security numbers sell for on the black market.
IT Portal Pro | Why your medical information is gold for hackers
Health IT Security | Are State Health Data Breach Notification Laws Needed?
What state recently enacted new telemedicine laws? Washington State
What data security elements were included in the Washington State legislation?
Davis Wright Tremaine LLP | M.D. Phone Home: New Legislation Expands Telemedicine in Washington
Hacking incidents by industry:
34% of healthcare data breaches are caused by employee error
The average notification timeline after a breach:
Health IT Security | Healthcare Data Breaches Most Common in 2015 Incidents
Which state is making a new move to protect student data? Colorado
What does it mean for education contractors? New Rules. New Data Security Requirements.
3 Key prohibitions in the bill:
Chalkbeat Colorado | Colorado lawmakers try again to tighten protection of student data
Which state updated its data breach law in March to shorten the time line for notification? Tennessee
How long do Tennessee businesses with data breaches have for notification? 14 days from discovery or notification of the breach
Is there an exception to the 14 days? yes, a legitimate law enforcement need
Did Tennessee also expand what triggers a notification? Yes
What new event triggers a notification? When the breach is caused by your own employee
JD Supra | Alston & Bird | Tennessee Updates Data Breach Statute to Require Notice in 14 Days
Which state passed new data security laws in 2016? Wyoming
Were the new laws the result of a breach or a legislative mandate? The result of a 2 year, 4-member Joint Task Force on Digital Information Privacy
What are agencies asked to do? 2 tasks
Where does procurement come into play? To fix and protect the data in perpetuity as state and local governmental entities determine industry best practices. Any wagers on whether government currently implements best practices protect data?
Wyoming Tribune Eagle | Law requires state agencies take 2nd look at data security
What entity released guidelines on teleworking and cyber security? The National Institute of Standards and Technology
What suggestions in the guidelines that will direct procurement opportunities?
virtual mobile infrastructure technologies
that create temporary, secure environments for teleworkers who need to access organizational data that are destroyed when the session is over
Fed Scoop | NIST issues draft cybersecurity guidelines for teleworking
Krebs on Security | Hospital Declares ‘Internal State of Emergency’ After Ransomware Infection
KOAM 7 | AIA Statement on House Homeland Security Committee Hearing on the Role of Cyber Insurance
Why are wireless mice vulnerable to hacking? Unencrypted communication with computers is what guide the mice.
What does that mean? For $20, someone a block away can trick your computer into using its mouse and steal your data.
Why would regulators care? Because regulators stress encryption in data security.
Reuters | Wireless mice leave billions at risk of computer hack: cyber security firm
What entities are the new targets for data security enforcement? HIPPA adjacent health and wellness companies.
Why are HIPPA adjacent health and wellness companies the focus of regulators? These companies collect and store personal health information. For example:
What kind of enforcement actions are being considered for this health care app data? Regulators are looking for reasonable & appropriate data storage and data security protection.
Health Data Management | FTC steps up protection of consumer health data
The U.S. Justice Department arrested invididuals that attempted to break into a small dam to disrupt operations. The informed intel:
Washington Post | U.S. charges Iran-linked hackers with targeting banks, N.Y. dam
What happened that led to a lawsuit? A health care network experienced a data breach, followed its internal protocols to handle the data breach.
What did the plaintiff’s allege that the health care network didn’t do that caused them harm? health network had violated the HITECH Act in protecting personal health information
What did the courts say? “There is no case law that suggests that an isolated privacy breach or discrete series of related breaches constitute a violation of the HITECH Act,” states the district court opinion. “Moreover, the Relator fails to allege that KHN failed to implement policies and procedures to address various security risks.”
What’s the take away? When a health care provider follows data breach protocols to protect health records, following those steps shows protections for health records.
Health IT Security | US Appeals Court Affirms FCA Healthcare Data Breach Case
What happened on University of California campuses to cause a UC hacker policy? In 2015 Hackers Broke into the UCLA Medical Center.
In response to the hack what policy did UC officials enact? UC installed data monitors that stores internet traffic on campuses for 30 days
Do faculty like this idea? No, UC has a policy dating back to the 1930s that providers for collaborative policy making in conjunction with faculty input. It’s all very Californian.
Did UC create a greater data security risk? Some say yes, because capturing and storing 30 days of university internet traffic is a treasure trove of data for hackers
Which UC official decided to install data collection monitors? Janet Napolitano, the university president and a former secretary of homeland security in the Obama administration
NPR | All Things Considered | At Calif. Campuses, A Test For Free Speech, Privacy And Cybersecurity
Who is touting new legislative approach to cyberstalking? Rep. Katherine Clark (D-Mass.)
What does her bill do?
SC Magazine | SXSW: Dem. lawmaker plans to introduce online harassment legislation
BuxxFeed | Congresswoman Unveils Plans To Prosecute Severe Online Threats Against Women
Data security of self-driving cars spurs calls for uniform data security standards for self-driving cars.
Have there been a push for self driving car regulations or statutes in Texas ? Yes, why yes, there has. 84R HB 933
Did those pushes include data security issues? No.
The Hill | Lawmakers worry about cyberattacks on self-driving cars
Wired | Thousands of Trucks, Buses, and Ambulances May Be Open to Hackers
Thank you for subscribing to our newsletter.
Great things are just around the corner!