Skip to Content

July 24, 2018 | Deborah Baughman

Data Security for Retirement Plans

If you are an employer, there is a good chance you sponsor a qualified retirement plan, such as a 401(k) plan, and offer your employees coverage under a group health plan. These employee benefit plans maintain a lot of detailed personal information about participants and their families, including, names, dates of birth, Social Security numbers, …

Read More

July 1, 2018 | Shaunte' Wilcher

Email Marketing Guide: Compliance with PECR and the GDPR

What are the requirements to be compliant with PECR and GDPR? Email marketing communications must comply with the GDPR and the strict rules within the UK’s Privacy and Electronic Communications Regulations (PECR). The GDPR does not replace PECR. Existing PECR rules continue to apply, but using the new GDPR standard of consent. The rules on …

Read More

July 1, 2018 | Adriana Aguilera

Carpenter v U.S.–The Executive Summary and Analysis

Cell phones are an integral part of everyday life, so integral that when you feel for your phone in your pocket and notice it is missing, you may have a moment of panic. They act as a camera, watch, navigation system, and can help you quickly solve a debate with a Google search, easily conducted …

Read More

January 8, 2018 | Hailey Kimball

The Intel Chip Weakness Should be a Red Flag for Your Business

If your business has not considered liability insurance for data breaches before now, now is the time. From small mom and pop shops to publicly traded entities, nearly all businesses are electronically storing some type of confidential information—be it employees’ social security numbers and dates of birth or customers’ credit card numbers. And while you …

Read More

October 16, 2017 | Jon Sriro

Consequences of and Lessons Learned from the Equifax Data Breach

The Equifax data breach has and will have significant long-term ramifications for data security practices and personal privacy. Understanding how the Equifax data breach occurred and the type of data compromised is crucial to understanding the consequences of this breach. Reason for the Data Breach Based on available information, it appears that the hackers were …

Read More