Cyber Law News
Federal Trade Commission Act & CAN-SPAM Act of 2003 by Salar Atrizadeh
The Federal Trade Commission Act is codified under 15 U.S.C. 41-58, and regulated all types of marketing and advertising. The established duties of the FTC are to prevent unfair competition and practices, create remedies for consumers, and conduct investigations. The FTC creates guidelines for both online and offline businesses.
Learn More...
What is Cybersecurity defines Cybersecurity as a body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. There have been many substantial data breaches recently. Cybersecurity needs to be addressed on an internal perspective, as well as an external perspective.
Learn More
Who Puts Data At Risk
Who puts your business data at risk? There are four types of employees who put the workplace at risk for cybersecurity breaches. First we have the security softy, this is a person who knows very little about cybersecurity and poses a threat, by using their work computer at home, or by letting a family member use it unsupervised.
Learn More
Emerging Trends in Cybersecurity
When we take a close look at the emerging trends and issues in cybersecurity, we realize how global the problem has become. In 2015 the Ponemon Study revealed that health care data attacks are on the rise. This report mirrors the statement that the Department of Justice released in terms of cyber security attacks, especially in healthcare.
Learn More
Cybersecurity Threats
In a digital world, threats to cybersecurity is a minute by minute concern. The Verizon 2014 data breach was one of the larges data breaches of our time. This was a devastating blow to Verizon, yet taught us much about the importance of cybersecurity. The data breach investigations that followed identified many threats. Hackers could not only breach your website, they could breach your POS (Point of Sale) terminals.
Learn More
GIPS Global Investment Performance Standards
GIPS, the Global Investment Performance Standards, are industry standards utilized for calculating and presenting investment performance results to prospective clients. There is a significant overlap with the 1933 & 1934 Acts and Investor Advisers Act of 1940 requirements.
Learn More
Sarbanes Oxley Act of 2002 – SOX Act
The Sarbanes Oxley Act of 2002, otherwise known as SOX, impacted the awareness and monitoring of internal controls. SOX was passed in the wake of Enron, Worldcom, and Tyco scandals of the past in terms of accounting and board of director liability. Modern accounting systems are computer based, and accurate financial reporting depends on reliable, and secure, computing environments.
Learn More
Cyber Lawyers

Displaying listings from all locations.

Use the fields below to filter listings for a particular country, city, or state. Start by selecting the top most region, the other fields will be automatically updated to show available locations.

Use the Clear Filter button if you want to start over.

Chris Corpus
151 Innovation Drive Suite 260G, Elyria OH
Corpus Law Inc.
Joseph F. Bermudez
1225 17th Street, Suite 2750, Denver CO
Introduction to Data Security & Cyber Liability: Why does it matter to you and your clients?
Wilson Elser Moskowitz Edelman & Dicker LLP
More lawyers