David Navetta provides a legal analysis of the court’s denial of the bank’s motion for summary judgment in the case. An odd result — we know. We previously reported on the lawsuit filed by Experi-Metal, Inc. (“EMI”) and the subsequent motion for summary judgment (and briefs) filed by Comerica Bank to have the case dismissed….
Category: Commentaries and Analyses
DWP plugs up electronic data leaks
Kable reports: The Department for Work and Pensions has reported data leaks from paper but none from electronic devices over the year. Its resources accounts (PDF) for 2009-10 reveal that in April 2009 it lost paper documents from its offices which contained the names, dates of birth, national insurance numbers and bank details of 145…
S’pore firms prone to data theft
Kenny Chee reports: Singapore companies are too trusting with their data, and are all too willing to give out confidential information to vendors and partners. That’s according to a security expert in the United States, who says that this creates a hotbed for cybercrimes like data theft. Mr Bryan Sartin, director of investigative response at…
Loss of personal information as stressful as losing a job
An overwhelming majority of Americans believe that their personal online actions can help make the greater online world safer for everyone, including their friends, family, country, and the larger global community of Internet users, a national survey of U.S. adults by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group n(APWG) finds. […]…
20 Million Americans Have Multiple Social Security Numbers Associated With Their Name
More than 20 million Americans have multiple Social Security numbers (SSNs) associated with their name in commercial records according to a new study announced today from ID Analytics, Inc., a leader in consumer risk management. The study also found that rather than serving as a unique identifier, more than 40 million SSNs are associated with…
What To Do When Your Database Gets Breached
Adam Ely excerpts from a new report by Dark Reading: It’s 3 a.m., and you get the call: There has been a breach. You don’t know much about it, just what the first responder could quickly relay. Upon arriving and assembling your team, you realize the situation is very serious. A database containing highly sensitive…