article thumbnail

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

.” In November 2017, Estonia announced that it would suspend security digital certificates for up to 760,000 state-issued electronic ID-cards that are using the buggy chips to mitigate the risk of identity theft. The Estonian electronic ID cards have been manufactured by the Swiss company Trub AG and its successor Gemalto AG since 2001.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Biden administration issues Executive Order and takes action to enhance maritime cybersecurity

Data Protection Report

Alongside the Executive Order, the Biden administration announced a plan to invest in the domestic manufacturing of port cranes to reduce reliance on foreign-built infrastructure potentially used by nation-state and financially motivated attackers to disrupt U.S. organizations. maritime infrastructure. Commercial Strategic Seaports.

article thumbnail

States Attempt to Address Privacy Risks Associated with Digital Copiers and Electronic Waste

Hunton Privacy

The program must include convenient methods for consumers to return electronic waste to the manufacturer and instructions on how consumers can destroy data on the devices before recycling or disposing of them. These bills reflect an enhanced focus on the privacy risks associated with digital office equipment.

Privacy 40
article thumbnail

FTC Investigating Privacy Risks to Data Stored on Digital Copiers

Hunton Privacy

Federal Trade Commission Chairman Jon Leibowitz recently sent a letter to Congressman Edward Markey, Co-Chairman of the bipartisan Congressional Privacy Caucus, announcing that the FTC will address the privacy risks associated with the use of digital copiers.

Privacy 40
article thumbnail

Article 29 Working Party Opines on Mobile Apps

Hunton Privacy

The Opinion identifies the key data protection risks associated with mobile apps and clarifies the legal framework and obligations applicable to the various parties involved in the development and distribution of mobile apps, including app stores, app developers, operating system and device manufacturers and advertisers.

article thumbnail

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

A sandbox is an isolated environment where users can safely test suspicious code without risk to the device or network. A number of computer manufacturers and cloud service providers have deployed sandboxes for regular use by clients. Also Read: 3 Facts about Sandbox-based Gateway Appliances. What is a sandbox? Why sandboxing?