Technology

New York AG Files Lawsuit Against Dunkin’ Donuts For Attacks On Customer Accounts

On September 26, 2019, New York Attorney General Letitia James filed a lawsuit against Dunkin’ Brands, Inc., the franchisor of Dunkin’ Donuts (“Dunkin’”). The lawsuit involves security issues surrounding Dunkin’s stored value cards, which customers can use to purchase Dunkin’ food and merchandise. Customers can create an online account through Dunkin’s website or mobile app, ...
Read more

The Perils of Social Media Promotions in the Hospitality Industry

Truth in advertising is not only a best practice; it’s the law. It applies to all media – from newspapers and magazines to radio spots to online platforms, such as blogs or social media. It is required in both overt advertisements and implied claims buried in otherwise innocuous posts. As such, it creates a minefield ...
Read more

Texas Updates Breach Notification Requirements

Effective January 1, 2020, the Texas legislature will impose new notification requirements on businesses that maintain personal information of customers. House Bill 4390 amends the Texas Identity Theft Enforcement and Protection Act by requiring that Texas residents be notified of a data security breach within sixty (60) days of the determination that a breach has occurred. A ...
Read more

Hospitality Cyber Threats Are Alive & Well – Lessons From Recent Incidents

The data incident involving the Starwood guest database was one of the most significant data security incidents in recent years. Publicly announced on November 30, 2018, the details revealed in the days and weeks following the announcement contain some striking reminders and new lessons for the hospitality industry. Here are some of the key facts ...
Read more

Preventing Cybercrime

HOW TO RESPOND TO COMPUTER POP-UPS. In addition to being annoying, computer pop-ups or notifications are often the first step a cyber-criminal uses to victimize unsuspecting users. Be cautious of any notification or pop-up messages. Examples include emails that say you have to download something in order to see a greeting card or a message ...
Read more

Effectively Using Social Media At Trial

The process begins with obtaining information via requests for production, interrogatories, requests for admissions, depositions, etc. If used effectively, social media discovery can become an effective defense strategy that will withstand objections and scrutiny at trial. Social media evidence is important information to explore, especially considering most people (Plaintiffs) tend to have no filter when ...
Read more

U.S. Companies Still Grappling With GDPR

Several months after the European Union’s (EU’s) new sweeping privacy law known as the General Data Protection Regulation (GDPR) went into effect on May 25, 2018, U.S. companies are still struggling to understand the implications for their businesses. This article highlights some of the key threshold issues that companies should consider in analyzing the potential ...
Read more

The Unique Challenges of Data Security in the Hospitality Industry

The hospitality industry has been in the news frequently over the past year as a result of multiple and significant data security incidents. Nationally recognized hotel and resort brands continue to suffer by cyber-attacks, including theft of payment card data from their retail and food/beverage outlets, and at times theft of guest data from reservations ...
Read more

The Most Aggressive Privacy Law in the U.S.: Tracking the California Consumer Privacy Act of 2018

Signed into law on June 28, 2018, the California Consumer Privacy Act provides the most comprehensive and aggressive privacy law in the United States — despite being pushed through the legislative process in one week. The California State Legislature will reconvene from Summer Recess on Monday, August 6, and it is expected to reevaluate the ...
Read more