ISPLS Announces its Second Annual Privacy Symposium

ISPLS’s biggest event of the year is officially announced. The Symposium on Government & Corporate Responsibility in a Data Driven World will be held Wednesday, March 20th from 9:00am – 3:00pm at the Washington College of Law in room NT01.

Stop by to hear from experts in the field of digital privacy.  Topics covered include Supply Chain Risk Management and Software component transparency; the use of Biometrics, and the Roles of Platforms in proper Data Governance.  Speakers include industry leaders from Consumer Advocacy Groups, Corporations, Government, Law Firms, and Think Tanks.

This is a great opportunity to hear from thought leaders and network with professionals.  Breakfast and Lunch will be provided.

Click here for more information Privacy Symposium

Featured post

Cybersecurity and the Future of Medical Devices

By Soniya Shah

It’s no secret that attacks on the security of data and privacy are occurring with increasing frequency, which is alarming no matter what the data is. However, healthcare is one of the most frequently targeted sectors, and among those least equipped to handle when an attack happens, with data breaches that cost the industry about $5.6 billion a year. Particularly, attacks on medical devices pose a new concern in the Internet of Things world. Healthcare organizations have a higher sense of urgency is accessing their systems, since patient data can be time-sensitive. It’s creepy to think that a pacemaker or MRI scanner could be affected with malware. Malware software can do anything from deleting data to copying it, with a wide range of what can happen in between, including corrupting the data, extorting it, and modifying it. It’s easy to see why criminals would want to take advantage of this kind of information. Medical records contain the most intimate details about a person and that information can be used in identity theft. Continue reading “Cybersecurity and the Future of Medical Devices”

Digital Magic in the World of Disney

By:  Soniya Shah

It’s the happiest place on Earth. Until a data breach breaks the magic. Walt Disney was a pioneer of the future and all that it would bring. When designing Tomorrowland in Disney’s Magic Kingdom, engineers channeled the optimism Walt Disney felt for the future. With all his hope for the future of technology, it is hard to imagine Disney predicting data breaches. And yet that’s exactly what’s happened.

Continue reading “Digital Magic in the World of Disney”

Renegotiating Data Localization: The Role of Provincial Law in NAFTA e-Commerce

By:   Eitan Morris

Globalization and technology have led to increases in opportunity and connectivity for individuals and businesses around the globe.  In response to the increasingly porous nature of technological barriers, many countries are attempting to exert control through regulation.  A common method of regulation is through the implementation of data localization legislation.   Data localization is the requirement that data about a country’s citizens or residents be collected, processed, and/or stored on servers physically located in-country.  Placing limitations on the cross-boarder transfer of data can have consequences across economic sectors.  For these reasons, data localization regimes have been called into question.  One key example is Canadian provincial data localization laws which have become a hotly contested element in the e-commerce section of the current North American Free Trade Agreement (NAFTA) renegotiations.

Continue reading “Renegotiating Data Localization: The Role of Provincial Law in NAFTA e-Commerce”

All Eyes on Cryptocurrency: The 2018 G20 Summit  

By:  Alvaro Maranon

Bitcoin’s popularity has gathered global momentum over the past year, with its unprecedented increase in value that saw its all-time high break the $20,000 mark. With money being made, two questions naturally arose – what exactly are cryptocurrencies and how can they be regulated to protect the players involved? Cryptocurrencies became possible with the development and creation of the Blockchain, and subsequently led to the development of Bitcoin and other cryptocurrencies, ranging from  alternative fiat-based currencies to a satirical open source peer-to-peer digital currency based upon the use of Shiba Inus.

On February 6, 2018, the Committee on Banking, Housing, and Urban Affairs held an open session solely focused on Virtual Currencies and the oversight role of the SEC and CFTC. The Chairman of the SEC, Jay Clayton, and the Chairman of the CFTC, Christopher Giancarlo, acknowledged the rapid development and importance of the cryptocurrency market but in turn cautioned investors of the dangers with it being unregulated. Mr. Clayton identified three main takeaways: 1) these are not “currencies” in the traditional meaning and are closer to securities; 2) Initial Coin Offerings (ICOs) have not been registered with the SEC and will be considered as the sale of securities; and 3) be weary of ICOs as they are prone to money-laundering schemes, digital hacks, and “pump and dumps.”  Ultimately this hearing marked the first of many hearings aimed at informing regulators of the landscape and how to regulate it.

Continue reading “All Eyes on Cryptocurrency: The 2018 G20 Summit  “

New, Real, and Deadly Threat to Our Healthcare: Cyber Extortion

By: Drusti Gandhi

Cyber extortion, specifically attacks on healthcare organizations, has been on the rise; with no evidence of stopping. Cyber Extortion comes in many ways ranging from ransomware to denial of service and distributed denial of service. Ransomware attack involves encrypting data, blocking the healthcare provider from accessing it, and threatening to publish it unless the attackers are paid. Meanwhile, denial of service and distributed denial of service attack involves continuous assault on the computer system with emails and other traffic, which results in shutting the system down. Attackers then demand money to stop the attack. With the new technological advances in the healthcare, patient’s information is not the only vulnerable target. Wearable health technology and surgical robots in some areas can also become potential targets, which can lead to physical injury or even death.
Continue reading “New, Real, and Deadly Threat to Our Healthcare: Cyber Extortion”

Blog at WordPress.com.

Up ↑