What are the pros and cons of a national breach notification law? What are the questions that need to be asked to facilitate this discussion? What are the critical points that need to be made?
Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it [...]
Does your business have this digital information about other people? 1. last name + first name or first initial + social security number, driver's license number, or other government issued identification, or account or card numbers + access codes, or 2. information that identifies an individual + concerns a health condition or healthcare If you answered [...]
Texas amended its existing data breach notification law which became effective on September 1, 2012. The relevant section of the law is titled "Notification Required Following Breach of Security of Computerized Data" and is found at Section 521.053 of the Texas Business and Commerce Code. The main body of the law provides as follows: (b) A [...]