By Tandy Mathis On Friday, March 23, 2018, Congress passed a 2,232 page omnibus spending bill. Included in the bill was a bipartisan act known as the “Clarifying Lawful Overseas Use of Data Act” or CLOUD Act, which will allow United States law enforcement to access the data stored abroad for U.S. citizens and will … Continue reading
By Nathan White According to the recently released North Carolina Attorney General Security Breach Report, nearly 5,337,154 North Carolinians were impacted by security breaches in 2017. The Report highlights several trends data protection specialists and North Carolina businesses should take into consideration.
By Nathan A. White Can the government force the hosting service of an activist website company to turn over vast amounts of user data in order to track down political protesters? According to a federal court ruling, the answer — Yes, but let’s slow this train down a little bit. On Thursday, August 24, 2017, District … Continue reading
By Bill Butler Recently, the D.C. Circuit Court of Appeals ruled in Attias v. CareFirst, Inc., No. 16-7108, that customers had standing to sue a health insurer for a 2014 data breach in which the customers’ information was stolen. In reversing the district court’s dismissal of the class action, the D.C. Circuit held that the … Continue reading
By Tandy Mathis, Elena Mitchell, and Mindy Vervais Did you know that if you’ve taken a New York City taxi since 2009, your pick-up and drop-off locations were recorded and published (through June of 2016) on the internet for anyone to find? Now, New York City officials want ride-sharing companies like Uber and Lyft to start … Continue reading
Saturday January 28, 2017 is Data Privacy Day. The Moore & Van Allen Privacy and Data Security group took a break from the pre-holiday revelries to put together some thoughts and tips for DataPoints. So hoist a glass and enjoy this read, and try not to ponder too long the irony that Data Privacy Day … Continue reading
by Member Omari Sealy Similar to website browsers, many mobile applications collect a variety of information from the user, including, the user’s identity, usage history, past log-ins, and location. This enables the application to provide various functionality and to tailor features of the application for a better user experience (e.g., items retained in a shopping … Continue reading