» Regulations & Compliance

Liability for data breaches goes beyond customer lawsuits

July 27, 2010 by Steve Hannaford

It’s not just your customers who’ll sue you if you’re hit by data thieves.  That’s what retailer TJX Companies, owner of clothing discounters T.J. Maxx and Marshalls, found out after a data breach led to a flurry of different lawsuits.  More…

New federal identity theft laws on the way?

July 26, 2010 by Steve Hannaford

New national identity protection laws have been working their way through the Senate and appear to have some bipartisan support. More…

Who can you trust with your private data?

July 6, 2010 by Steve Hannaford

It’s not just professional cybercriminals you should be hiding your sensitive data from. It’s also some of the most commonly used applications and powerful institutions in the computer world, who are either taking your data without your consent or doing a bad job at protecting it. More…

Cartridge company sues HP

June 21, 2010 by Steve Hannaford

Turbon AG, a German maker of replacement laser printer cartridges, has lodged a suit in U.S. federal court against Hewlett-Packard. The claim: HP stole the company’s trade secrets for refilling and remanufacturing toner cartridges. More…

Cybertheft victim sued by bank

June 8, 2010 by Sam Narisi

You’re a bank, and faulty security measures result in a customer’s account being hacked. What do you do? Apparently, you sue the customer. More…

Company sued after manager reads personal e-mails

May 25, 2010 by Sam Narisi

Do employees have a right to privacy when using personal e-mail accounts, even when they send the messages at work? They may, depending on the company’s policies, according to a recent court decision. More…

Can Congress get data security law right?

May 24, 2010 by Steve Hannaford

A surprising 70% of data security professionals in a recent survey urged the federal government to pass national data security laws. But are the feds up to the task? More…

FCC and judge: Junk text messages a no-no

May 20, 2010 by Steve Hannaford

Unwanted text messages from advertisers are subject to the same restrictions as annoying telemarketing calls, according to a recent court decision. More…

High Court case could change online privacy rules

April 19, 2010 by Sam Narisi

Pagers? Who uses pagers in the world of iPhones and Blackberries? Not many folks, but a legal dispute about the outdated devices could have an impact on the way businesses use other technologies. More…

Senators introduce new Internet security bill

March 29, 2010 by Sam Narisi

After controversy surrounding a previous proposal, lawmakers have returned with a new federal cybersecurity bill. More…

IT hurrying to meet EHR deadline

March 12, 2010 by Sam Narisi

Hospitals and doctors’ offices have four years to convert health records into digital documents. Will they be able to make the deadline? More…

Hard-hitting data breach law in place as of March 1: Did you notice it?

March 10, 2010 by Sam Narisi

Massachusetts has just put into effect a strict data security law — and don’t think that you can ignore it because your business is located outside the Bay State. More…

New data protection law in effect March 1

February 22, 2010 by Sam Narisi

As the federal government gears up to pass a law requiring companies to help prevent data breaches, states are making their own rules. More…

Getting junk mail over your fax? You can sue!

February 16, 2010 by Steve Hannaford

Fax may be dying out, but many companies still need them to conduct business, especially with less tech-savvy clients. But these days, you are as likely to get junk faxes as real communications. More…

Text messaging: Another e-discovery headache

January 26, 2010 by Steve Hannaford

While companies are still struggling to figure what e-discovery rules mean for e-mail retention, experts say there’s a new area to start worrying about: More…

Telecommuting incentives gain momentum

January 12, 2010 by Sam Narisi

State governments, as well as the feds, are gearing up to give businesses an incentive to start telecommuting programs. More…

Feds get tough on data breaches

December 8, 2009 by Steve Hannaford


A major new federal data security law (Personal Data Privacy and Security Act of 2009) is gaining steam and is going to set new, more precise rules for the management and safekeeping of corporate and government data. More…

Lawyers can now grab your metadata

November 17, 2009 by Steve Hannaford

Most companies now understand that all sorts of data on their servers is vulnerable to be dragged into court in the event of a lawsuit. But now it’s their metadata that’s under attack, and the change may mean more trouble yet. More…

Company sued for firing obscene Web browser

November 10, 2009 by Sam Narisi


When an employee’s caught looking at offensive Web sites, the person’s usually fired. But it’s not always that simple. Take this recent case, for example: More…

Feds put IT in the hot seat for security breaches

November 3, 2009 by Sam Narisi


The legal liability for getting hacked is getting real, as a few recent news stories demonstrate — and Congress is working on even tougher rules. More…

Employee fired over empty cartridges sues

November 3, 2009 by Sam Narisi

A 25-year employee says he was wrongfully terminated after an ambitious co-worker falsely accused him of stealing used printer cartridges. More…

Texting in the car makes crash 23 times more likely

November 2, 2009 by Steve Hannaford

We all know that driving and text-messaging don’t mix. And the topic has gotten national recognition, with Transportation Secretary Ray LaHood recently calling it a “national epidemic.” More…

High–quality printers mean better fake IDs

October 23, 2009 by Sam Narisi

British police are battling an outbreak of new fake ID mills, all powered by high quality color laser printers. They’ve shut down at least 20 “ID factories” over the last year and a half. More…

Facebook scammers impersonate your friends

October 13, 2009 by Sam Narisi

There’s a new Facebook scam that everyone needs to watch out for. It involves cyber-criminals impersonating victims’ online friends. More…

Former inmate caught breaking into prison’s IT system

September 28, 2009 by Sam Narisi

Many companies run background checks while hiring to keep convicted criminals away from sensitive corporate data. Here’s a case where that strategy wouldn’t have worked. More…

Dell sued for fraud: Is your biz affected?

September 22, 2009 by Valerie Helmbreck

Dell customers in New York who claimed the company defrauded them recently learned they could be eligible for restitution. Were consumers elsewhere in the country also victims? More…

How cloud computing could land IT in court

September 15, 2009 by Sam Narisi


Many businesses are turning to cloud computing for an affordable and scalable solution. Others are giving it serious consideration. But what are the legal dangers of keeping all that information in the cloud? More…

E-mailing at home: The latest legal trap?

August 26, 2009 by Sam Narisi

Thanks to new technology, many employees can get their work done anytime and anywhere. That sounds great to managers — but it could get the company sued. More…

Getting more e-mails than usual? Study says your company’s going under

August 25, 2009 by Sam Narisi

The way e-mail’s used says a lot about a company’s culture. But can e-mail patterns tell you when a company’s about to go belly-up? More…

Do your firm’s managers spy on employees?

August 6, 2009 by Sam Narisi

Many employers monitor employees’ e-mail use to prevent data leaks, harassment and other legal problems. In one recent case, a manager went a step further, putting his company on the hook for a violation of privacy. More…



  • How to Select a Web Host
    November 27, 2011 by marketing

    Creating a new website?  Not sure how to choose from among all the options?  Need shared hosting, small business hosting, or VPS hosting?  Lots of email accounts? 5-star reliability rating? Fortunately, there’s information available to help. The Best Web Hosts is great resource that will help you select the best web hosting company. It features reviews, rankings, and definitions that can help make your job of selecting a new web host more effective.

  • SMART Steps Towards Workload Automation
    January 19, 2010 by Luke Marchie

    Consolidating job scheduling into a single, comprehensive workload automation solution is a critical first step to effective Workload Automation (WLA).

    Download the free whitepaper here! More…

  • Identifying and Thwarting Malicious Intrusions
    January 12, 2010 by Luke Marchie

    Identifying and Thwarting Malicious Intrusions

    The phenomenal growth in social media has opened the door for all new malicious intrusions from gangs of cyber criminals. Utilizing the trusted relationships in social networking and benefiting from immature security and content controls, hackers are seeing increased performance in their attacks.

    Download the free whitepaper here More…

  • The Security Issues with Web 2.0
    January 12, 2010 by Luke Marchie

    The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

    Download the free whitepaper here


  • Network-Critical Physical Infrastructure: Optimizing Business Value
    December 29, 2009 by Luke Marchie

    To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in Network-Critical Physical Infrastructure (NCPI). No longer are simple availability and upfront costs sufficient to make adequate business decisions. Agility, or business flexibility, and low total cost of ownership have become equally important to companies that will succeed in a global, ever-changing marketplace.

    Download the free whitepaper here! More…

  • The New World of eCrime: Targeted Brand Attacks and How to Combat Them
    December 26, 2009 by Luke Marchie

    Nothing is more valuable to a business than its reputation. That is why brand attacks, which leverage a company’s valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they’re being launched with new and rapidly evolving exploits, including phishing and—most recently—malware.

    Download the free whitepaper here! More…

  • DDoS: The Mother of All Cyber Threats
    December 16, 2009 by Luke Marchie

    DDoS: The Mother of All Cyber Threats

    Don’t wait until your business is targeted. A Forrester Consulting study commissioned by VeriSign revealed that nearly 75 percent of the 400 study respondents have experienced one or more DDoS attacks in the past year. Yet, most e-commerce businesses are not prepared for a large-scale DDoS attack. Could your business afford three or more hours of downtime? Avoid that revenue loss by registering for this free white paper

    Click here to download the free white paper More…

  • View more offers

    Quick Vote

    • Does your office have a color printer or copier?

      View Results

      Loading ... Loading ...

  • advertisement