On Dec. 30, 2019, President Trump signed the Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence (TRACED) Act into law. As its name implies, the bipartisan TRACED Act targets unwanted and illegal robocalls by requiring carriers to implement a number-authentication system allowing consumers to better identify unwanted robocalls and by stiffening penalties for robocalls. The TRACED Act also contains important modifications to the Telephone Consumer Protection Act (TCPA), which governs the use of automatically dialed telephone calls and text messages.
Continue Reading Passage of TRACED Act Promises More TCPA Enforcement and Regulatory Activity
Taft Law
Join us for a Data Breach Response Event in Indianapolis on Feb. 21
Join Taft and Sikich for an informational session on Feb. 21 as two of our professionals share their experiences before and during a data breach and share their insights in the hopes of helping you better prepare for and survive a data breach. Register here.
Schedule:
3:30 – 4:00pm Registration & Networking
4:00 – 5:00pm Presentation
5:00 – 6:00pm Networking, drinks & hors d’oeuvres
Presenters:
Scot Ganow, Senior Counsel – Taft Stettinius & Hollister LLP
Scot is co-chair of…
Continue Reading Join us for a Data Breach Response Event in Indianapolis on Feb. 21
Addressing Data Breaches During Due Diligence – What is a Buyer (and Seller) to do?
Taft Business & Finance attorneys Jim Butz and Caroline Thee recently published an article on data breaches becoming increasingly problematic during the due diligence stage of transactions. The article addresses what a buyer (and a seller) should do when investigating a target’s exposure to unauthorized access to data or other proprietary information. Read the article here.
Continue Reading Addressing Data Breaches During Due Diligence – What is a Buyer (and Seller) to do?
Upcoming Seminar: Cybersecurity for Defense Contractors and Manufacturers
Join Taft attorneys Barbara Duncombe and Bill Wagner for a complimentary seminar on the DoD cybersecurity regulations on Oct. 18 at Taft’s Indianapolis office. They will participate in an informal, interactive discussion with Richard Banta and Alex Carroll from Lifeline Data Centers and Josh Griswold and Joe Turek from Chubb concerning recent developments (including cyber breaches), evolving standards of compliance and practical, effective risk mitigation strategies. Click here to register.
Topics will include:
- Final preparations to ensure compliance with DoD’s
…
Continue Reading Upcoming Seminar: Cybersecurity for Defense Contractors and Manufacturers
10 Tips for Presenting Complex Cases In Arbitration
The American Arbitration Association (AAA) and its International Centre for Dispute Resolution (ICDR) recently created an aerospace, aviation and national security panel of arbitrators to handle complex, high-value aerospace, aviation, defense, cyber and security-related disputes. Similarly, AAA has a special panel of arbitrators to handle technology-related disputes. But what should companies involved in these types of arbitration cases expect?
Taft attorneys Bill Wagner and Michael Diamant recently published an article in Law360 with 10 tips for presenting complex cases in…
Continue Reading 10 Tips for Presenting Complex Cases In Arbitration
Taft Co-Hosts Upcoming Panel Discussion: Cybersecurity: Recent Developments and Risk Mitigation Strategies
Please join us at Taft Indianapolis on March 21 for a breakfast event featuring an informal, interactive panel discussion covering recent developments (including cyber breaches), evolving standards of compliance and practical, effective risk mitigation strategies.
Agenda:
Registration and Continental Breakfast: 7:30-8:00 a.m.
Discussion: 8:00-9:30 a.m.
Panelists:
- Richard L. Banta and Alex J. Carroll from Lifeline Data Centers, LLC
- Frederick W. McClaine from Shepherd Insurance
- James A. Butz and William C. Wagner from Taft Law
Click here for the PDF invitation…
Continue Reading Taft Co-Hosts Upcoming Panel Discussion: Cybersecurity: Recent Developments and Risk Mitigation Strategies
Wagner Article “Takeaways From NASA Cloud Security Audit” Published by Law360
Bill Wagner authored the article “Takeaways From NASA Cloud Security Audit,” which was published by Law360 on March 1. The article discusses the Office of Inspector General’s audit report on the security of NASA’s cloud computing services and offers discussion points for corporate management and directors to consider in their own cybersecurity efforts.
In the article, Bill also provides some discussion points for a tabletop review of NASA’s audit findings with your management and board.
Bill is co-chair…
Continue Reading Wagner Article “Takeaways From NASA Cloud Security Audit” Published by Law360
Privacy vs. Security
The terms data privacy and data security are sometimes swapped back and forth as though they mean the same thing. They don’t, though they are tightly interlocked.
One way to consider how they’re different is to think of data privacy as the who and what of confidential information that must be kept safe and data security as the how, the means for keeping it safe.
Put another way, data privacy focuses on the individual whose private information is at…
Continue Reading Privacy vs. Security
Privacy in the Cloud: Protecting Yourself
Demand for cloud computing is mounting swiftly, with double-digit annual growth rates expected through 2018.
Use of a remote, shared computer network to store, manage and process data can save time and money by eliminating the need for a local data center and an IT team to run it. Whether on a smart phone, a laptop or a desktop computer, cloud computing gives users immediate access to data anywhere there is an Internet connection.
Gartner, one of the world’s foremost…
Continue Reading Privacy in the Cloud: Protecting Yourself
Top Five Privacy Risks in Web Applications
The Web hosts a vast array of applications, many of them critical for business operations, from office suites such as Google Docs, to email, calculators, spread sheets and data storage.
Nearly all mobile applications connect to the cloud, storing private business information, user names, passwords and other sensitive content. Employees tie into the Web with mobile device apps such as Google Maps, LinkedIn and Wink, which allows users to see from afar who is ringing the home doorbell or lets…
Continue Reading Top Five Privacy Risks in Web Applications