Main Menu Back to Page
{ Banner Image }

Showing 18 posts by Taylor A. Gast.

Cybersecurity Concerns in Health Care

Health care systems are eager to adapt to newer technology and widespread network options, all in the name of giving patients the best possible care. However, this comes with a price: more outlets for hackers to breach valuable data.  Read More ›

Categories: Cybersecurity, Electronic Health Records

GDPR Has Arrived and My Company Isn't Ready. Now What?

It's not hyperbole to say that the General Data Protection Regulation's May 25th enforcement date marks one of the largest shifts in the history of privacy laws. Read More ›

Categories: Cloud Computing, Compliance, Cybersecurity, Digital Assets, Liability, News, Privacy

Potential $13.5 Million Uber Fine Highlights the Importance of Risk-Based Breach Response

The legal fallout from ridesharing service Uber's 2016 data breach, which affected approximately 57 million riders and drivers, has been significant. Read More ›

Categories: Cybersecurity, Did you Know?, Lawsuit

Make Sure Your Holiday Gifts Don’t Get You Fined

On December 12, 2017 President Trump signed the National Defense Authorization Act. In part, the Act requires registration of all drones weighing more than .55 and up to 55 pounds, if you plan on flying them outside. Read More ›

Categories: Compliance, Did you Know?, Regulations

Are Ransomware Payments Tax Deductible?

Earlier this year it was revealed that hackers had seized 1.5 terabytes of data from HBO, and over the course of the summer the hackers released the stolen property, including script summaries for "Game of Thrones," as well as scripts and entire seasons of other HBO shows. Read More ›

Categories: Cybersecurity

#Sponsored: What Social Media Influencers Need to Know to Remain Compliant with the FTC

Influencer marketing on social media is a very big business. Here’s how it works: brands team up with individuals with large and engaged followings on social media platforms such as YouTube, Facebook and Instagram (i.e., “influencers”), and pay them to promote their products. Read More ›

Categories: Digital Assets, News, Regulations, Social Media

Two Stars?! What can my Business do in Response to Negative Reviews?

Businesses are understandably concerned about negative reviews posted on popular websites such as Yelp, Facebook, and TripAdvisor. Read More ›

Categories: Did you Know?, Digital Assets, News, Social Media

HHS Office for Civil Rights Publishes Checklist for HIPAA Covered Entities Responding to Cybersecurity Incidents

The U.S. Department of Health and Human Service's Office for Civil Rights ("OCR") recently published guidance for entities covered by HIPAA, entitled "My entity just experienced a cyber-attack! What do we do now?" Read More ›

Categories: Cybersecurity, Digital Assets, Electronic Health Records, Fraud & Abuse, HIPAA

FAA Drone Registration Rule Struck Down

DroneThe District of Columbia Court of Appeals recently struck down a regulation from the Federal Aviation Administration ("FAA") mandating registration of all drones. The Court found that the registration requirement was too intrusive and overstepped the bounds of the FAA. The petitioner argued that the registration requirement imposed by the FAA violated the statute's clear instruction not to promulgate any rule or regulation relating to model aircraft. The Court found the argument persuasive and vacated the registration rule to the extent it applies to model aircraft used by hobbyist. Read More ›

Categories: Regulations

Border Searches May Compromise the Privacy and Security of Company Technology

International FlightRecently, international travelers have noticed US Customs and Border Protection agents with increased interest in searching cell phones, laptops, and other portable technology. Employers should be aware that this trend increases the risk that an unauthorized individual will access sensitive company information, which could result in an inadvertent data breach.

Some international travelers have been asked by border agents to unlock cell phones or provide a password needed to unlock the device. One report included a customs agent threatening to seize a travelers' phone if he did not unlock his cellphone. Employers are rightfully concerned that these searches may allow unauthorized individuals to access sensitive company information. Read More ›

Categories: Employment, News, Privacy