From the Internet Crime Complaint Center (IC3): Recent FBI analysis reveals that cyber criminals engaging in ACH/wire transfer fraud have targeted businesses by responding via e-mail to employment opportunities posted online. Recently, more than $150,000 was stolen from a US business via unauthorized wire transfer as a result of an e-mail the business received that contained malware. The…
Category: Commentaries and Analyses
National Breach Warning System Urged
Tracy Kitten writes: Forty-six states have breach-notification laws on the books, but no law is the same, and enforcement is weak. In 2011, as malicious breaches continue and the sophistication of cyberattacks increases, Foley, co-founder of the non-profit Identity Theft Resource Center, says it’s time for a national breach notification law. “This would be easier…
Audit: Md. computer network could be more secure
Max Smith reports: If you live or work in Maryland, your personal information; including tax forms, license applications and state payroll details, are on file in the Maryland Comptroller’s office, and an audit has found its systems should be more secure. The legislative audit found that software security and access controls were inadequate, with 84…
Is Florida failing to adequately protect its residents?
One of the recurring themes on my blogs is that we need a federal data protection statute that includes protection of paper records. Breaches involving paper records also need to be included in any federal data breach notification statute. Federal statutes are needed because too many states fail to address the security of paper…
The night the lights went out in Georgia?
Wainwright Jeffers reports: Some Dougherty County school workers worry the system put them at risk of identity theft. School officials say they shouldn’t be concerned. WALB learned that twice this week, the system sent employees an e-mail asking them for personal information, including social security numbers for a school system data base. Both times, follow…
Today’s Award for the Silliest Theory of the Computer Fraud and Abuse Act
Orin Kerr, a law professor and former attorney in the DOJ who worked in the computer crimes division, has a commentary on a lawsuit involving CFAA claims that’s interesting in terms of defining the scope of what the Computer Fraud and Abuse covers – and shouldn’t cover: Today’s Award for the Silliest Theory of the…