Blog Archives

Dwolla and the CFBP – Is mere puffery a deceptive practice in cyber-security?

The Consumer Financial Protection Bureau (“CFPB”) filed an interesting consent order in re: Dwolla, Inc. concerning their cyber security practices. 1)See “CFPB Takes Action Against Dwolla for Misrepresenting Data Security Practices”, available at http://www.consumerfinance.gov/newsroom/cfpb-takes-action-against-dwolla-for-misrepresenting-data-security-practices/.)) The order begins with CFPB identifying

Posted in Data Breach, Law, News & Commentary Tagged with: , ,

Court Order Compelling Apple’s Assistance Under the All Writs Act

On February 16, 2016, a magistrate judge in the Central District of California issued an order, under the All Writs Act, compelling Apple to assist the FBI in searching an iPhone 5C that belonged to Syed Rizwan Farook. Farook was

Posted in Law, News & Commentary, Security Tagged with: , , , ,

FTC– LabMD, Wyndham, and Regulating Cybersecurity Under the “Unfairness” Prong

The FTC brought an administrative action against LabMD, a Georgia based medical testing lab, because of a security incident occurring within the company. A decision by the administrative law judge came out recently essentially saying the FTC failed to carry

Posted in Data Breach, Law, News & Commentary Tagged with: ,

Understanding the Implications of FTC v. Wyndham on Data Security Practices

The Federal Trade Commission (FTC) is very active and interested in data breaches and other cyber security incidents. The federal government and many state governments are slowly adding legislation that specifically addresses issues of cyber security and data breach reporting,

Posted in Data Breach, Law, News & Commentary Tagged with: ,

Silk Road gets shutdown

Silk Road was a particularly unfortunate example of good technology used for bad ends. It was a virtual black market for drugs, identity theft, and other crime. An affidavit from FBI special agent Christopher Tarbell hit the internet today which

Posted in Digital Forensics, Law, News & Commentary, Security Tagged with: , , ,