Do brands ask for your personal information, so they can provide you something tangible in return, or for their own financial gain?
The Internet of Things may provide fantastic new opportunities for humankind, but it may also lead to growing security risk and continued diminution of our privacy.
More Global Practices Posts
Use the new law (CASL) to refine your record-keeping, bolster your efforts on tracking recipient activity and enhance relationships with your key stakeholders.
The retail industry, banks and other types of businesses that collect payment card information are not the only targets of pernicious hackers.
The decision established a controversial concept of a “Right to be Forgotten,” significantly changing the way search engines will have to operate in Europe.
It’s incumbent upon you as a data curator to know how much you have in the bank so that you can properly assess the measures you need to take to protect it.
The best way to handle a data breach is with a methodical and practiced incident response plan and a commitment to helping the affected consumers protect themselves from identity theft and fraud.
Could it be that people are both increasingly inviting brands in and therefore more sophisticated about what they expect?
Keeping track of higher education cybersecurity threats is imperative to protect the integrity of institutional assets, the network and infrastructure.
The goal is to help employees understand how their actions online directly impact your business’ success or failure.
With much still to be decided in the coming months, our issue experts in Washington, D.C. took a look ahead at how the 114th Congress may deal with a range of issues.
The explosive growth of sharing-economy companies is largely based on a groundwork of trust in other human beings.