To continue reading, please log in.
If you do not have a username and password, please contact The McCalmon Group for subscription options.
|
To continue reading, please log in. If you do not have a username and password, please contact The McCalmon Group for subscription options. |
Conversations About Child Sexual Abuse Material: When Is It Enough For Safe Adults To Report?A teacher is arrested after CSAM was found on his computer. Learn whether just discussing sexual abuse materials is enough to trigger reasonable suspicion. read moreAsk Jack: Is AI A Threat. . . Now?For months, experts have predicted that artificial intelligence (AI) will change the cyber defense landscape. Jack details a report that states it is now here. read moreAsk Jack: Do Shield Laws For Reporting Child Sexual Abuse Extend To Social Media Posts?Jack is asked if shield laws that protect reporters from defamation, and other tort claims, extend to posts made about sexual abuse on social media.? read moreData Compliance Audit: A Double-Edge Sword When Defending Data Security ClaimsA new report claims a surge in ransomware attacks. Compliance audits are necessary to limit risk, but there is a dark side to audits if organizations are not ready to comply. read more |
©2008-2024 The McCalmon Group, Inc. The McCalmon Group's User Agreement and Privacy Policy. |