Faruki Blog

Tick, Tick, Tick: Yahoo! Reminds Us (Again) the Clock is Ticking With Data Breach Notification

Timing is everything. Indeed, we have all heard these wise words shared when we are being counseled on the value of patience in our lives. Well, the.. Read More

There are no small breaches: OCR settles with UMASS Amherst

So we are barely out of November, and we have our thirteenth major HIPAA enforcement action for 2016. On November 22, 2016, the Office of Civil.. Read More

Privacy Law Basics: "SPAM, SPAM, SPAM, SPAM". CAN-SPAM Act of 2003

The second law in our series is the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003, thankfully abbreviated as.. Read More

Privacy Law: Back to Basics

We are kicking off a new blog series here atFarukidesigned to provide businesses the basics on privacy law and some tips on where and how the law can.. Read More

Some Thoughts on the Yahoo! Breach

So, as the news cycle spins and people rush to change their passwords and account information resulting from the data breach of 5 million records at.. Read More

Stop Spamming Me, Bro. (And just because we've met doesn't mean it's not SPAM)

Spam in 2016. Why is this still a thing? Yeah, I know what you are thinking, "Scot, it will always be a thing." Fair enough. But I am not talking.. Read More

Security is More Than Keeping Information Private

I am always counseling my clients to be careful in their use of the term "breach." (I call it the "B Word"). The reason for such caution is because.. Read More

Pokémon Stop! (Or Maybe Just Slow Down A Little)

You cannot swing a dead cat without hitting someone who is downloading and playing the new Pokémon Go game for smartphones (forget the cat, you.. Read More

Summer Hospitality- Ways to Protect Yourself from Cyber Threats While Traveling

Summer travel is ramping up. And so are hackers looking to prey upon one of their favorite targets— the hospitality industry. Every year, the.. Read More

Team Up! Why a Multidisciplinary Team is Best for Breach and Crisis Response Management

I have gone on and on before about data breach response management and how it is not IF but WHEN data breach comes to your company, yada, yada, yada... Read More