Posted: April 23rd, 2017
By: Thomas Gaffney*| Staff Writer
On March 1, 2017, Maria Vullo, Superintendent of Financial Services for the Department of Financial Services in the state of New York, promulgated Part 500 of Title 23 of the Official Compilation of Codes, Rules and Regulations of the State of New York, into law. This new regulation is more commonly referred to as the controversial NY state financial cybersecurity rule. Many financial institutions fought this rule vigorously because they view the bill as unprecedented, overly restrictive, and extremely costly for compliance.
Continue reading »
Posted: March 1st, 2017
By: Maria Pigna*| Staff Writer
On Wednesday, January 18, 2017, the Central Intelligence Agency (CIA) published in full, for the first time, revised rules for collecting, analyzing, and storing information on American citizens. CIA General Counsel, Caroline Krass, told a briefing at the Agency’s headquarters in Langley, Virginia that the guidelines are designed “in a manner that protects the privacy and civil rights of the American people.” The CIA refers to the rules as the revised Attorney General Guidelines and will become effective March 18, 2017, sixty days after they are signed by the Director of the CIA and the Attorney General. Continue reading »
Posted: February 10th, 2017
By: Libby Casale*| Staff Writer
Cybersecurity is an evolving and growing field, and one full of unknowns. Panelists discussed cybersecurity, cyber incidents, and cybersecurity breaches at the Cyber Security Panel during the 2017 JBIPL Banking Law: Current and Future Issues Symposium.
For breaches, it is often not a question of whether, but when, a breach will happen. Breaches can take multiple forms. They may be caused by hactivists, state sponsored theft, cyberterrorism, or could also be caused by malicious insiders. Additionally, breaches could be caused by something as simple as a self-populating email header or by sending your files to an unintended recipient. Continue reading »
Posted: December 12th, 2016
By: Anna-Bryce Flowe*| Staff Writer
We’ve all gotten those annoying calls to our cell phones with an automated voice on the other end of the phone trying to sell us a cruise or a trip for two to the Bahamas; even creditors use these automated voices to keep us on the line while they try and collect on debts owed, refinance our cars, or upgrade us to a new credit card! For years people have used the typical “ TAKE ME OFF YOUR LIST!” demand as a means of dodging these unwanted calls to their landlines. But, is this demand to cease calling effective when the calls come to your cell phone? What about when you provide your cell phone number to the calling party? And, who— by law—is actually able to keep calling you with these “robocalls” regardless of your attempts to remove your number from their “List?” Continue reading »