Skip to content

Cyber Law Blog

Exploring technology law in cyberspace

  • AMP.legal

cyber security

Bring Back the Hack Back?

October 21, 2019May 8, 2020 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Cyber Security

In 2017, U.S. House Representative Tom Graves introduced H.R. 4036, known as the Active Cyber Defense Certainty Act (ACDC Act). The ACDC Act, or hack back law, amends the Computer Fraud and Abuse Act of 1986 (18 […]

Read more

E-Discovery Tech Finds Breaches

March 31, 2019May 8, 2020 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Cyber Security
Hacked

A cyber breach incident requires a rapid response to meet the intense scrutiny by regulators. Companies must plan for recovery by having the tools in place to find the source of a breach. BIA, a leading e-Discovery […]

Read more

Big Tech Promotes Data Privacy

February 28, 2019May 8, 2020 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Data Privacy
Glass Bricks

Lawmakers are considering the passage of a national data privacy law that will resemble Europe’s General Data Protection Regulation (GDPR). Meanwhile, Big Tech is feeling the effects of the European law. In early 2019, Google received […]

Read more

Securing Business Tech Devices

January 5, 2019May 8, 2020 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Cyber Security
Steampunk devices

Most companies use various types of tech devices and systems to run their businesses. As a result, each type of technology has its own risks of being hacked. A business can establish a culture of best practices […]

Read more

Business Cyber Planning Guide

January 3, 2019May 27, 2019 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Cyber Security

All companies should be ready to react to a cyber incident. A cyber attack will cause panic and confusion for a business. Having a cyber response plan in place is critical so a company can experience a […]

Read more

Bitcoin Faucet Rewards Users

December 18, 2018January 5, 2019 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Blockchain
Faucet Ship

To increase the adoption of Bitcoin, developers are creating new ways to sustain growth and attract new users. A Bitcoin faucet is a web application that provides a rewards system where users can earn small […]

Read more

QR Improves Blockchain Security

July 29, 2018July 30, 2018 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Blockchain
QR Code

Security problems discourage the growth potential and long-term acceptance of blockchain innovations. As blockchain technologies attract more users, companies are looking for stronger ways to secure their platforms. Every day, more than 100,000 users are joining […]

Read more

Cyber Policy Transfers Breach Risk

March 31, 2018April 17, 2018 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Cyber Insurance
Open Country

A cyber insurance policy transfers risk to an insurance company for losses involving a cyber breach. However, a cyber insurance policy is not a substitute for implementing adequate safeguards to secure an organization’s network. Cyber […]

Read more

Congress Considers Hack Back Law

January 30, 2018October 21, 2019 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Cyber Security
pegasus

Congressional committee findings show that cyber crimes pose a “severe threat” to the economic strength of the United States. The committee found that the threat continues to grow because law enforcement has limited resources to respond […]

Read more

Google Compels Websites To Use SSL

December 12, 2017January 3, 2019 Alice M. Porch, Esq., CIPP/US, C|EH, Security+Cyber Security

Most states have data breach laws that require companies to secure the personal data of their customers, yet WIRED reported that only 50% of websites use the Internet’s secure HTTPS protocol. With the release of Chrome […]

Read more

Posts navigation

Older posts

Recent Posts

  • Ransomware Payments Warning
  • Florida Data Privacy Law In Retreat
  • Data Brokers Individual Opt-Out
  • Bring Back the Hack Back?
  • E-Discovery Tech Finds Breaches
  • Big Tech Promotes Data Privacy
  • Data Privacy Builds Customer Trust
  • Securing Business Tech Devices
  • Business Cyber Planning Guide
  • Agencies Target Blockchain Scams

Categories

  • Artificial Intelligence (2)
  • Blockchain (15)
  • Cyber Insurance (2)
  • Cyber Security (9)
  • Data Breach Laws (3)
  • Data Privacy (7)
  • Ransomware (4)

Authors

  • Alice Porch (42)

Research Tools

  • State Data Breach Laws

CYBER LAW RESOURCES

  • Top Internet Law Blogs

CREDITS

  • Pexels
  • Pixabay

NOTICES

  • Disclaimer
  • Privacy Notice

RSS Feed

RSS Feed

FEEDBURNER

 Subscribe in a reader

Tags

active defenseApacheartificial intelligenceattorneyAWSbakktbest practicesbitcoinblockchainbotsbreach litigationbreach responsebusinessCambridge AnalyticaCardanochatbotscryptocurrencycyber breachcyber defensecyber due diligencecyber extortioncyber insurancecyber securitydata breachdata breach lawsdata brokersdata managementdata privacydata sharingeDiscoveryencryptionentertainmentEquifaxEthereumexploitFacebookfinancialfloridaFlorida data privacy lawflorida privacy lawFTCGDPRGooglehack backhackerhackershoneypotHTTPSICOIntegraInternetIoTKaleidolawyerLitecoinmalwaremillennialsnotificationOpenLawopt-outpersonal informationpetrophishingpretextingprivacyprivacy lawprivacy noticeprivacy policyQRransomwareRipplerisk assessmentrisk of harmrobot lawyersafe harborscamsmart contractssmishingsocial engineeringsocial mediastate breach lawstaxesUbervishingworm
  • LinkedIn
Copyright © 2017, Alice M. Porch, P.A. All Rights Reserved.
Cyber Law Blog
Tampa, Florida
alice@amp.legal
813.273.8144
Powered by WordPress | Theme: Astrid by aThemes.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled