Reasonable Cybersecurity Measures for Protection After collecting personal information, businesses must take “reasonable measures” to safeguard it. Some states, such as Florida and Alabama, have this standard (or a similar one) in their cybersecurity statutes. On the federal level, the Federal Trade Commission has brought numerous enforcement actions against companies…
Read More
Originally published in the September 2018 issue of Tampa Bay Business & Wealth. In recent years, cryptocurrencies have gained traction worldwide as an increasingly common form of investment or electronic payment. Because cryptocurrency operates in the cyber world, many of the best practices for protecting other online information also apply…
Read More
Understand the Stakes of Collecting Personal Information Cybersecurity law has been called many things in recent years—evolving, complex, varied, cutting-edge, even hilarious. Ok, maybe not the last one. But I would offer another phrase that can serve as a key takeaway from this article. This phrase also highlights the importance…
Read More
Marie Tomassi answered questions for the July 2018 Florida Trend special report on Florida law, discussing the opportunities that today’s technological landscape creates for excellent client service. Trenam Law has a highly collaborative and collegial culture, which it has maintained through continued growth in recent years. “Making strategically smart, nimble…
Read More
Data privacy law in the United States continues to evolve at a rapid pace, and all companies would be wise to pay close attention. As any company that has experienced a data breach can attest, the location of a company’s offices does not solely determine which law applies. Instead, companies…
Read More
John Goldsmith provided insight in the September/October 2017 issue of Retail Merchandiser, highlighting retailer liability and risk mitigation related to fraudulent purchases using chip credit cards. Due to massive global credit card fraud, the EMV standard (Europay, MasterCard and Visa) was adopted throughout most of the world, including the U.S.…
Read More
Cybersecurity measures on a budget can include regular training, safe email practices, secured systems and a good cyber insurance policy. Our dirty little secret is out. A cursory review of recent articles in ABA magazines and webzines, let alone a full-fledged search on Google, reveals the unsightly truth—law firms are…
Read More
During the 11 p.m. edition of WFLA Channel 8 News, John Goldsmith discussed a recent security threat aimed at consumer credit cards with encrypted chip technology. Evidence suggests that chips have been removed from credit and debit cards, enabling thieves to use the stolen chips to access cardholders’ funds. In…
Read More
2/10/2017 As seen in the Tampa Bay Business Journal A Tampa cybersecurity firm is preparing to publish what the CEO says will be the first report designed to help top corporate executives understand the business risks of data breaches. The Cyber Balance Sheet Report, designed for boards of directors and C-level…
Read More
Nowadays, the prudent business owner should be cognizant of cybersecurity and the public relations and legal costs that can arise from a data breach. By holding personal information of customers, employees, or anyone else, the business assumes the legal and public relations obligations to keep that information secure. Cybersecurity is…
Read More