The Stop Online Piracy Act, and its sister legislation in the Senate, the Protect Intellectual Property Act caused quite a stir in Silicon Valley, Hollywood and Washington. The two bills were intended to put a hard stop on theft of intellectual property on the Internet, by means that are controversial in terms of the First Amendment. Big players from the overlapping worlds of movies and music pushed for this bill. So did their high priced lobbyists. But SOPA and PIPA were ultimately shelved last week, and not just because there were formidable forces lined up against it. Google, Facebook, Yahoo, AOL and Twitter are just a few of the tech companies that opposed the bills, and they can certainly afford some pretty high priced lobbyists, too.
Identity Theft 911 Chief Privacy Officer Ed Goodman speaks to AM Best about the risk companies face when handling sensitive customer data. He also provides tips for consumers affected by the Zappos breach.
Receiving a breach letter or email doesn’t mean you’ll become a victim. It means something’s happened that could put you at risk. Faced with a breach notice, most people do one of two things—both wrong. They ignore it and throw it away or they freak out and start closing accounts. Do this instead:
1. Read the notice carefully to learn what information may have been exposed and how. (Keep the notice in case you ever need to prove that your data was compromised through no fault of your own.)
The U.S. Supreme Court’s recent decision on GPS tracking is a mixed bag for privacy rights.
In a unanimous ruling, the justices required law enforcement officials to obtain a search warrant before they attach a GPS tracking device to a vehicle. A warrantless search would violate the Fourth Amendment.
But the court ducked the larger issue of whether warrants are required for other kinds of surveillance technology, including geolocation tracking in cellphones and RFID tags.
If you thought hacktivism, privacy violation fines and cloud security were so last year, think again. Identity Theft 911 experts highlight risks that will impact your organization in 2012.
When someone steals your identity, it’s not likely to tickle your funny bone.
But if anyone could find humor in the topic, it would be “Bridesmaids” star Melissa McCarthy and “Horrible Bosses” lead Jason Bateman.
Shop at Zappos? Then chances are you’re one of 24 million customers whose personal information may have been compromised in a security breach at the popular online retailer.
Hackers gained access to customers’ names, phone numbers, addresses and the last four digits of their credit card numbers in an attack on the company’s servers in Kentucky, according to The Associated Press. The company, owned by Amazon.com, is contacting customers by email and encouraging them to change their passwords.
Identity Theft 911 experts offer these additional tips for Zappos customers to protect their online accounts:
Phishing scams, smartphone hacks and online tracking. These identity theft trends may sound familiar. Our experts say you can expect to see these risks continue, along with new and more sophisticated ways that thieves will compromise your identity.
Working from home offers freedom and flexibility, but it also opens the door to data breaches that can jeopardize your client relationships—and your bottom line. Follow these five tips to protect the integrity of your data.
Whether you telecommute for your corporate job, sell homemade crafts online, or practice law from the living room, you are responsible for protecting the personal information of anyone you do business with. No matter how small your operation, or even if you only occasionally work from home, your clients trust you to protect their data—and legislation in 46 states requires that you do so.
Back when the Internet was a baby, and I was taking my first steps in network security, hackers were a fairly homogeneous lot.
Sure, some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into popular websites to splash around some MS Paint. It was a way to rebel and earn credibility within the computer community.