Twitter | Search | |
Allison J Bender
Cybersecurity, law, and policy. Tweets = my own.
516
Tweets
1,578
Following
866
Followers
Tweets
Allison J Bender retweeted
Michael Lee Mar 15
Excited to announce that will round out our series of speakers and share her thoughts on privacy and data security in a keynote presentation at on April 4.
Reply Retweet Like
Allison J Bender Mar 16
Replying to @Klonick @smerconish
Really interesting (and mildly terrifying) exercise on and this AM! Many practical implications for how must be treated under US law ( + wave of proposed state laws) , others. Enjoyed your coverage w
Reply Retweet Like
Allison J Bender Mar 12
Solid roundup of proposals.
Reply Retweet Like
Allison J Bender Mar 11
End (or make it permanent). Something we can all get behind. 8 months on, 4 months off is ridiculous. Only benefit is the reminder to change smoke alarm batteries. I'm sure we can find another way to handle that.
Reply Retweet Like
Allison J Bender Mar 11
"From a practical perspective... legal and privacy personnel will become more technical, and technical personnel will become more familiar with legal and compliance mandates...The idea of two distinct teams, operating independent o…
Reply Retweet Like
Allison J Bender retweeted
Cedric Burton Feb 28
CCPA litigation threat driving backing of US federal law, lawyer says
Reply Retweet Like
Allison J Bender Feb 19
To all the , , and orgs their way to , here's a toolkit from and to help you. Only and some gumption required. It's worth it!
Reply Retweet Like
Allison J Bender Feb 6
Hello London! Looking forward to visiting!
Reply Retweet Like
Allison J Bender retweeted
Wilson Sonsini Feb 6
Join 2/27 for a panel on + and how they affect UK companies. Special guest Yukiko Lorenzo () will speak w/ partners Jan Dhont & and Of Counsels & Lore Leitner. RSVP now
Reply Retweet Like
Allison J Bender Feb 4
I used your app to live cast from my phone to TV over residential wifi. It was awesome. The rarest of lags. Excellent quality picture. No image-sound mismatch. Thank you! Your app developers and IT team were MVPs in my house.
Reply Retweet Like
Allison J Bender Feb 1
Keeping data you don't have a business need for means holding on to the responsibility for protecting it and the legal risks associated with that data if you are breached. Don't do that to yourself. When in doubt, throw it out (securely, please).
Reply Retweet Like
Allison J Bender Feb 1
Excited to be joining and with moderating on "The Trust Deficit: Why Tech Must Make Trust Its #1 Priority"
Reply Retweet Like
Allison J Bender Feb 1
:-)
Reply Retweet Like
Allison J Bender Jan 28
😡 HIV status and test results of 5,400 Singaporeans and 8,800 foreigners leaked (intentionally by former MoH employee who was HIV+ himself) via
Reply Retweet Like
Allison J Bender Jan 25
Replying to @allanfriedman
I gave that feedback to BHUSA team this year after speaking on my first panel. I know that the skirted table is a separator between speakers and the audience, but I appreciate not worrying about flashing the audience / clumsily falling from a very tall chair (narrowly avoided!)
Reply Retweet Like
Allison J Bender Jan 11
Reply Retweet Like
Allison J Bender Jan 2
Replying to @0x686967
Good luck!
Reply Retweet Like
Allison J Bender Jan 2
Replying to @0x686967
Maybe one of the bug bounty as a service platforms, eg, Bugcrowd, HackerOne? In particular, the participating companies with safe harbor language in their policies. Just be sure to stay within the lines.
Reply Retweet Like
Allison J Bender Jan 2
A significant issue to watch in 2019 ...
Reply Retweet Like
Allison J Bender retweeted
Wilson Sonsini Dec 26
Get the latest news and developments from this year in the 2018 Year in Review
Reply Retweet Like