Cyber Security/Privacy

CIA Releases New Rules for Collecting Information on Americans

By: Maria Pigna*| Staff Writer

On Wednesday, January 18, 2017, the Central Intelligence Agency (CIA) published in full, for the first time, revised rules for collecting, analyzing, and storing information on American citizens.  CIA General Counsel, Caroline Krass, told a briefing at the Agency’s headquarters in Langley, Virginia that the guidelines are designed “in a manner that protects the privacy and civil rights of the American people.”  The CIA refers to the rules as the revised Attorney General Guidelines and will become effective March 18, 2017, sixty days after they are signed by the Director of the CIA and the Attorney General.  Continue reading »

Overview Cybersecurity Panel – JBIPL 2017 Symposium

By: Libby Casale*| Staff Writer

Cybersecurity is an evolving and growing field, and one full of unknowns.  Panelists discussed cybersecurity, cyber incidents, and cybersecurity breaches at the Cyber Security Panel during the 2017 JBIPL Banking Law: Current and Future Issues Symposium.

For breaches, it is often not a question of whether, but when, a breach will happen. Breaches can take multiple forms.  They may be caused by hactivists, state sponsored theft, cyberterrorism, or could also be caused by malicious insiders.  Additionally, breaches could be caused by something as simple as a self-populating email header or by sending your files to an unintended recipient. Continue reading »


By: Anna-Bryce Flowe*| Staff Writer

We’ve all gotten those annoying calls to our cell phones with an automated voice on the other end of the phone trying to sell us a cruise or a trip for two to the Bahamas; even creditors use these automated voices to keep us on the line while they try and collect on debts owed, refinance our cars, or upgrade us to a new credit card! For years people have used the typical “ TAKE ME OFF YOUR LIST!” demand as a means of dodging these unwanted calls to their landlines. But, is this demand to cease calling effective when the calls come to your cell phone? What about when you provide your cell phone number to the calling party?  And, who— by law—is actually able to keep calling you with these “robocalls” regardless of your attempts to remove your number from their “List?” Continue reading »