Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
Articles 1 - 2 of 2
Full-Text Articles in Computer Law
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …