If you receive a data breach letter in the mail, don't ignore it. It will inform you that an unauthorized party has gained ...
The Colorado Department of Law adopted new regulations governing the collection and use of biometric identifiers and information about those under ...
Understand the mechanisms behind cyber threats and how they can compromise personal data. Learn practical strategies to protect personal information in the digital world. Gain insight into the role of ...
Concerns raised about potential misuse of academic, health data linked to the APAAR ID. Some parents wonder if students who ...
On December 5, the Colorado AG’s Department of Law (“Department”) completed its most recent round of rulemaking and adopted a new set of ...
URA seeks the details to improve tax compliance and identify individuals who may not have registered for tax obligations, ...
The civic group readies to take legal action if the watchdog proceeds with an urgent application to prevent the publication ...
Protecting your home network includes securing your router, just like your phone or laptop. Kurt “CyberGuy" Knutsson reveals ...
Children don't have to worry about their letters not making it to Santa, despite the disruptions from the Canada Post strike ...
Axon’s ongoing possession of the encryption keys for Police Scotland’s Digital Evidence Sharing Capability – which the UK ...
As Datavant works with 70,000 hospitals and clinics across the U.S., there’s a chance your children’s data may have been ...
Getting in to see your doctor in person can be difficult, especially when you’re busy. This is why many Americans have turned ...