The NIST framework features a set of granular controls that companies can implement to improve their approach to privacy assurance. Learn how!| Polymer
Under HIPAA, non-covered entities must ensure the products and services they use don’t compromise patient privacy. Learn how this applies to cloud apps.| Polymer
Data loss prevention (DLP) solutions often fail because organizations rely on legacy, network tools. Cloud apps need a new solution: cloud-based DLP.| Polymer
The Computer Fraud and Abuse Act (CFAA) was enacted in 1986, as an amendment to the first federal computer fraud law, to address hacking. Over the years, it has been amended several times, most recently in 2008, to cover a broad range of conduct far beyond its original intent. The CFAA prohibits intentionally accessing a computer without authorization or in excess of authorization, but fails to define what “without authorization” means. With harsh penalty schemes and malleable provisions,...| NACDL - National Association of Criminal Defense Lawyers
BackgroundThe Electronic Communications Privacy Act and the Stored Wire Electronic Communications Act are commonly referred together as the Electronic Communications Privacy Act (ECPA) of 1986. The ECPA updated the Federal Wiretap Act of 1968, which addressed interception of conversations using "hard" telephone lines, but did not apply to interception of computer and other digital and electronic communications.| Bureau of Justice Assistance