Search Results (2518)
Documents on communications law
Show: results per page
|Court Decertifies Class Action Suit against Henry Ford Health System for Data Breach|
Zachary W. Behler, Michael R. Blum, Lauren B. Dunn, Samuel J. Frederick, Gilbert M. Frimet; Foster, Swift, Collins & Smith, P.C.;
March 20, 2015, previously published on February 4, 2015The Michigan Court of Appeals recently decertified a class action suit against Henry Ford Health System (HFHS) and its subcontractor, a medical transcription service, for inadvertently disclosing sensitive patient information online. On December 18, 2014, a unanimous three-judge panel reversed the...
|Has Facebook Invaded Its BC Users Privacy|
Harpreet Dosanjh; Singleton Urquhart LLP;
March 20, 2015, previously published on March 2, 2015If you have access to a computer, the chances are good that you or someone you know belong to the social media site, Facebook. If you are a registrant you are aware that after joining the site you may create a personal profile, add other users, exchange messages, post photos, etc. What you may not...
|What Happens When a Twitter 'Tweet' of a Few Words Becomes a Horse Industry Defamation Lawsuit?|
Julie I. Fershtman; Foster, Swift, Collins & Smith, P.C.;
March 20, 2015, previously published on February 4, 2015At Foster Swift, we've successfully defended equine-related defamation litigation. Today we're sharing an interesting case from Massachusetts that arose from a "tweet" of only a few words.
|Getting Serious About Cybersecurity|
Eric J. Sinrod; Duane Morris LLP;
March 19, 2015, previously published on February 17, 2015Hack attacks have been in the news for a while. But the most recent headlines seem to indicate that hackers are far outpacing security efforts to contain them.
|The Duty to Report Data Leaks|
Jacomijn Christ, Hans Urlus; Greenberg Traurig, LLP;
March 19, 2015, previously published on March 5, 2015On Feb. 1, 2015, the Dutch House of Representatives voted in favor of a legislative bill introducing a duty to report data leaks. The bill, titled Duty to Report Data Leaks and the Expansion of the Administrative Penalty Competence of Dutch Data Protection Authority (Dutch DPA), will amend the...
|Will Companies Voluntarily Share Data Regarding Cyber Security at the President’s Request?|
Ashley Prickett Cuttino; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 16, 2015On Friday February 13, 2015, President Obama spoke at the White House Summit on Cybersecurity and Consumer Protection at Stanford University. After his address, President Obama signed an executive order, Promoting Private Sector Cybersecurity Information Sharing, that will encourage private...
|Honored in the Breach: Employer Action Items for an Insurer Data Breach|
Stephen A. Riga, Danielle Y. Vanderzanden, Timothy G. Verrall; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 5, 2015This morning, Anthem Blue Cross and Blue Shield, one of the largest health insurers in the country, notified its policyholders, members, and business partners that it was recently the target of an external cyber attack that appears to have comprised the confidentiality of medical and other personal...
|The Private Sector’s Role in the New Face of Homeland Security|
Madi Bakker, Ashley Prickett Cuttino; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 20, 2015The Obama administration recently announced the creation of the Cyber Threat Intelligence Integration Center (CTIIC), a new governmental agency created to prevent cyber threats by analyzing and integrating digital intelligence collected through government and non-government sources. The agency is...
|Cyberspace Oddity: The FCC Regulates Internet Services as Common Carrier Telecommunications Services, “Protecting and Promoting the Open Internet”|
Stephen S. Gilson, Dave Thomas, Paul A. Werner; Sheppard, Mullin, Richter & Hampton LLP;
March 18, 2015, previously published on February 27, 2015The FCC voted yesterday 3-2 along party lines to promulgate new rules necessary to protect the “Open Internet.” At the core of the Commission’s action lies its decision to reclassify Internet services as a “telecommunications” instead of “information”...
|Anthem's two small details that led to one big breach|
James J. Giszczak, Sara Hutchins Jodka, Dominic A. Paluzzi, Antoinette M. Pilzner, Miriam L. Rosen; McDonald Hopkins LLC;
March 18, 2015, previously published on February 18, 2015Since we first advised on the Anthem data breach, additional information about the breach has come to light that provides some lessons for all businesses. Two significant issues with Anthem’s security appear to have played a role in making the Anthem breach potentially the biggest disclosed...