The growing scale of cybersecurity concerns is prompting action from government leadership on the federal level. Before the Thanksgiving recess, the House’s Committee on Energy and Commerce got in on the act when two of its subcommittees–the Communications and Technology Subcommittee, chaired by Rep. Greg Walden (R-OR), and the Commerce, Manufacturing, and Trade Subcommittee, chaired by Rep. Michael C. Burgess, M.D. (R-TX)–held a joint hearing to investigate and consider the role of Internet-enabled devices (collectively referred to as the “Internet of Things,” or “IoT”) in high-profile online attacks. What the experts are saying.These experts shared conflicting opinions about whether it is in fact possible for the government to establish one set of security standards that covers all Internet-connected devices, as these devices do many different things and are powered by many different types of technology. Mr. Schneier reminded the … [Read more...] about House Energy and Commerce Committee Holds Hearing on Security of Internet of Things
When connected to wifi is data used
NTIA Announces Internet of Things WorkshopThe U.S. Department of Commerce National Telecommunications and Information Administration is convening a series of multi-stakeholder meetings concerning Internet of Things (IoT) Security Upgradability and Patching. The initial meeting will be held on October 19, 2016. An associated Federal Register notice describes the short-term goal of the multi-stakeholder process as to "develop a broad, shared definition or set of definitions around security upgradability for consumer IoT, as well as strategies for communicating the security of IoT devices to consumers." For a more detailed summary, click here. 1.4 GHz Band Buildout Waiver RequestLast week, the FCC’s Wireless Telecommunications Bureau issued a Public Notice seeking comment on TerreStar Corporation’s Request for Temporary Waiver of its Substantial Service Requirements for its commercial wireless licenses in the 1.4 GHz band. TerreStar is the sole nationwide … [Read more...] about Telecom Alert: September 19, 2016– IoT Workshop; TerreStar 1.4 GHz Buildout; PTC Spectrum; E-Rate Eligible Services; USF Contribution Factor; FCC Open Meeting
When businesses set out to safeguard “personal information,” a fundamental consideration is what that term means. Likewise, when negotiating a third-party vendor agreement, it typically is not enough to rely on the standard definition for “confidential information.” Recently, Nevada and other states have updated their definitions of personal information in connection with data breaches notification and safeguarding requirements. We cannot cover all of the updates here, but particularly for organizations in multiple states, it is important to ask the question and consider exactly what elements of personal information require protection. You may end up being more protective and include more data than necessary, it may be practical to do so, but you will want to know what must be protected.The Usual SuspectsIn states that have enacted data breach notification laws or affirmative obligations to protect personal information, you can count on personal … [Read more...] about Nevada Updated Its Definition of Personal Information, Have You?
In an increasingly connected world, lawyers at a coffee shop, a hotel or the airport may jump online to check email, get some work done or send a tweet. But that freedom to access the Internet practically whenever and wherever we want carries risks from thieves, hackers and nosy neighbors—a possible ethical violations of client privacy.Explaining how to avoid some of those perils was the task of two legal technology experts Thursday at an ABA Techshow presentation called the “Coffee Shop Office: The Ethics of Mobile Computing.”Co-presenters Sharon D. Nelson, president of Sensei Enterprises, a computer forensics and technology firm based in Farifax, Va., and Tom Mighell, a lawyer and senior consultant with the Dallas-based firm Contoural, offered security tips for using laptops, smartphones and tablets over a public WiFi network. (Mighell was a last-minute stand-in for ABA Journal legal technology writer Dennis Kennedy, who couldn’t attend due to a health … [Read more...] about Hot Topic: Keeping Data Secure at the Coffee Shop
Our headline today does not refer to those annoying ads that “pop-up” when you visit websites. We’re talking about the hottest trend in seasonal retailing – the pop-up store. These are the “here today, gone tomorrow” retail locations that you see during Halloween and Christmas seasons and are now everywhere capturing the back-to-school market.These locations either open in empty storefronts or in kiosk space in public areas of malls or places like Grand Central Station in New York and sell smaller, often location-targeted selections of merchandise. They are a good way for retailers to capture the “flash” shopper, to introduce new store openings, or to test and promote certain items or brands. The business case certainly exists for retailers to extend their brands through the pop-up space strategy.Pop-up stores also can be a data security nightmare.Because pop-up stores are intended … [Read more...] about How Secure Is Your Retail Pop-Up Store?