BakerHostetler’s 2014 Year-End Review of Class Actions (and what to expect in 2015) is available online. It includes discussion of data breach class actions as well as privacy class actions, and covers theories of liability, standing, and other issues raised in recent and ongoing cases.
Category: Commentaries and Analyses
The FTC’s requested budget: implications for data security enforcement cases?
I was never good with budgets, but damned if I can figure out FTC’s budget request to Congress for Fiscal 2016. Is it seeking funds to expand the number of data security enforcement cases it undertakes or is the budget based on simply maintaining the current level(s)? So when @FTC didn’t respond to my tweeted inquiry,…
Tweets that give me a knot in my stomach, Monday edition
32 edu sites all vuln to the same sql injection vuln….. this is going to be fun — abdilo (@abdilo_) February 2, 2015 and .@jessysaurusrex@g33kspeed@sambowne to put your mind at ease here is the amount in all the dbs together from the 0day sqli: 9,468,248 — abdilo (@abdilo_) February 2, 2015 If/when he posts a…
Experian ProtectMyID didn’t protect him from ID theft – Target customer
As this blogger and Brian Krebs have both pointed out on a number of occasions, Experian’s ProtectMyID may only monitor Experian’s own credit reports and not those of Equifax, TransUnion, or Innovis. Now one consumer seems to have learned that lesson the hard way. Consider the offer Target made to its customers following their massive breach…
Justice Department IG disputes Attkisson hacking claims
Erik Wemple reports: Many of the allegations made by former CBS News reporter Sharyl Attkisson regarding alleged computer intrusions by the U.S. government are disputed in a report by the Justice Department’s inspector general. “The OIG’s investigation was not able to substantiate the allegations that Attkisson’s computers were subject to remote intrusion by the FBI, other…
Courts Address the Level of Security Banks Must Provide to Business Accounts
Angel Diaz writes: Big or small, all bank accounts are susceptible to hijacking and fraudulent wire transfers. Banks ordinarily bear the risk of loss for unauthorized wire transfers. Two independent frameworks exist to govern these transfers: the Electronic Fund Transfer Act (“EFTA”) for consumer accounts, and Article 4A of the Uniform Commercial Code (“UCC”) for…