A cyber threat (or cybersecurity threat) is the possibility of a successful cyber attack that aims to gain unauthorized access, damage, disrupt, or more.| www.upguard.com
Personally identifiable information (PII) is data that could identify a specific individual. Learn how to protect this critical category of data.| www.upguard.com
BackgroundThe Electronic Communications Privacy Act and the Stored Wire Electronic Communications Act are commonly referred together as the Electronic Communications Privacy Act (ECPA) of 1986. The ECPA updated the Federal Wiretap Act of 1968, which addressed interception of conversations using "hard" telephone lines, but did not apply to interception of computer and other digital and electronic communications.| Bureau of Justice Assistance
The Telecommunications Act of 1996 is the first major overhaul of telecommunications law in almost 62 years. The goal of this new law is to let anyone enter any communications business -- to let any communications business compete in any market against any other. The Telecommunications Act of 1996 has the potential to change the way we work, live and learn. It will affect telephone service -- local and long distance, cable programming and other video services, broadcast services and services ...| www.fcc.gov