Search Results (2314)
Documents on communications law
Show: results per page
|Now is the Time to Take Proactive Measures in Cybersecurity|
Steven J. Bonafonte, Alex V. Hernandez, Edward B. Lefebvre, Timothy G. Ronan, Erick A. Russell; Pullman & Comley, LLC;
May 21, 2014, previously published on May 5, 2014If any C-suite officer ever thought that privacy and data security was an incidental concern, they need only look to recent headlines to see the opposite is true. News of data breaches appears almost daily, and last year’s data breach at Target is being reported as one of the factors in the...
|Snapchat Settles FTC Charges of Misrepresenting Privacy and Security Features|
Kenneth R. Florin, Ieuan Jolly, Nerissa Coyle McGinn, James D. Taylor; Loeb & Loeb LLP;
May 21, 2014, previously published on May 2014Snapchat, a mobile app that lets users send photos and videos that self-destruct within ten seconds, settled FTC charges relating to the app's ephemeral message feature and the app's data collection and security features. This settlement is notable because some of the "misrepresentations"...
|Clotting Heartbleed: Guidance on Privacy Breaches, Notification Obligations and Proposed Amendments to Privacy Legislation|
Rahim Esmail, Terry Gao; McCarthy Tétrault LLP;
May 20, 2014, previously published on May 6, 2014Canadian organizations with control over personal information should be aware of the privacy vulnerabilities of Heartbleed and their related legal obligations. Below, we have summarized: (1) the risks of Heartbleed; (2) the notification obligations of organizations that have experienced a privacy...
|“Selfie” Assessment - 4 Key Lessons from Snapchat’s Settlement with the FTC|
Jake Romero; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
May 20, 2014, previously published on May 13, 2014As a country we are quickly approaching a time in which most adults will be disqualified from being elected to public office because of something they posted on their social media account while growing up. Against this backdrop of over-sharing, Snapchat, Inc. won over the hearts of its users with...
|Tennessee Limits Employers’ Access to Private Social Media Accounts of Employees, Job Applicants|
Jackson Lewis P.C.;
May 19, 2014, previously published on May 13, 2014Tennessee has joined the growing number of states that prohibits employers, including government entities, from requesting or requiring access to the private social networking or online accounts of employees and job applicants. The Employee Online Privacy Act of 2014, signed by Governor Bill Haslam...
|US Government Announces Reforms to Space and Satellite Systems Export Controls|
Nathaniel B. Bolin, Jeffrey D. Gerrish, Jamieson Greer; Skadden, Arps, Slate, Meagher & Flom LLP;
May 16, 2014, previously published on May 13, 2014On May 13, 2014, the U.S. State Department’s Directorate of Defense Trade Controls (DDTC) and the U.S. Commerce Department’s Bureau of Industry and Security (BIS) issued interim final rules amending the U.S. export controls on satellites, spacecraft systems and related parts,...
|Internet Explorer Issues Patch to Fix Cyber Risk - April’s “Lessons Learned” for CIOs|
Kathie McDonald-McClure, Lisa E. Underwood; Wyatt, Tarrant & Combs, LLP;
May 14, 2014, previously published on May 1, 2014On May 1, 2014, Microsoft released a critical security update announcing a patch for all versions of Microsoft Internet Explorer (IE), including the XP version, which contained a security flaw making computers and their networks highly vulnerable to malicious hacker attacks. The patch, which fixes...
|Cyber Risks for the Boardroom Part 3: Top Questions Directors Should be Asking about D&O Coverage|
Danny Harary, Heidi A. Lawson; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
May 13, 2014, previously published on May 7, 2014Directors never want to be in the unenviable position of having to seek coverage under their D&O policy. Nevertheless the D&O policy is an indispensable corporate expense, particularly in the case of public companies, where exposures can be much higher. Especially today, when companies are...
|SEC Cybersecurity Initiative: Five Steps ALL Broker-Dealers and Investment Advisers Should be Taking|
Cynthia J. Larose, Breton Leone-Quick, A. W. "Chip" Phinney, Joel D. Rothman; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
May 13, 2014, previously published on May 6, 2014Last week, the U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) released a Risk Alert announcing its Cybersecurity Initiative. What does this mean to broker-dealers and investment advisers and, even if you are not one of the “chosen...
|Cybersecurity: A Growing Concern for the Utility Industry|
McDonald Hopkins LLC;
May 13, 2014, previously published on May 6, 2014The scope of the cybersecurity threat is large and continues to grow for the utility industry. After the well-publicized data breach of Target's credit card system, companies of all sizes and variety need to make cybersecurity a top priority. Protection of customer and employee information is...