Faruki Blog

Managing Breach: What I Think Many Companies Have Yet to Get

I recently spoke on a cybersecurity panel and fielded the same questions people usually want to know from lawyers when it comes to data breaches... Read More

Wanna Cry? I Do.

This could have been a lot less devastating. The news broke on Friday, May 12, that a crypto-locking virus was spreading around the globe infecting.. Read More

Privacy Law Basics: Stop Callin' Me! Telephone Consumer Protection Act (TCPA)

The fifth law in our series is the Telephone Consumer Protection Act, often abbreviated as "TCPA." Statute Telephone Consumer Protection Act .. Read More

"Alexa: Please Conduct a Personal Privacy Impact Assessment"

We in the privacy profession have long used a tool called the Privacy Impact Assessment, or "PIA." The use of PIAs is a long-standing best practice.. Read More

Tick, Tick, Tick: Yahoo! Reminds Us (Again) the Clock is Ticking With Data Breach Notification

Timing is everything. Indeed, we have all heard these wise words shared when we are being counseled on the value of patience in our lives. Well, the.. Read More

There are no small breaches: OCR settles with UMASS Amherst

So we are barely out of November, and we have our thirteenth major HIPAA enforcement action for 2016. On November 22, 2016, the Office of Civil.. Read More

Some Thoughts on the Yahoo! Breach

So, as the news cycle spins and people rush to change their passwords and account information resulting from the data breach of 5 million records at.. Read More

Security is More Than Keeping Information Private

I am always counseling my clients to be careful in their use of the term "breach." (I call it the "B Word"). The reason for such caution is because.. Read More

You're Never Too Big (or Small) for Your Breaches

Data breaches are reported nearly every day, and many are prominently featured as part of the 24-hour news cycle. Target, Uber, AshleyMadison.com, .. Read More
1 2 3 4 5