Search Results (2381)
Documents on communications law
Show: results per page
|Protective Order Can Limit Disclosure of Company’s Non-Public Information in Employment Dispute|
Joseph J. Lazzarotti; Jackson Lewis P.C.;
February 3, 2015, previously published on November 13, 2014When involved in litigation, a company's non-public information, such as trade secrets, can be prevented from becoming public information by a court-granted protective order. While a blanket protection is unlikely to be granted by a court, early consideration of information potentially sought by a...
|Does the Secret Service Need a BYOD Policy? Addressing Personal Device Usage in the Workplace|
V. John Ella; Jackson Lewis P.C.;
February 3, 2015, previously published on November 14, 2014According to a November 13, 2014 article in the New York Times (based on a review by the Department of Homeland Security), an intruder was able to enter the White House back in September due to a succession of performance, organizational, and technical failures. One of the specific findings was...
|CRTC Concludes First Enforcement Under Canada’s New Anti-Spam Legislation|
Arnold Fridhandler, Graeme S. Harrison; Bennett Jones LLP;
January 20, 2015, previously published on October 14, 2014On October 7, 2014, the Canadian Radio-television and Telecommunications Commission (CRTC) announced the conclusion of its first investigation and enforcement action under Canada’s Anti-Spam Legislation (CASL) since coming into force on July 1, 2014.
|The Most Hackable Month of the Year: Steps Companies Can Take to Protect Themselves from Data Breaches|
Kirsten Thompson; McCarthy Tétrault LLP;
January 16, 2015, previously published on November 28, 2014In a few short days it will be Cyber Monday, the kickoff to the financial madness that is the holiday shopping season. For cybercriminals and fraudsters, December represents the mother lode of hackable data.
|On the First Day of Privacy, the EU Gave to Santa......|
Susan L. Foster; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
January 16, 2015, previously published on December 9, 2014If your company doesn’t have an office in the EU, but collects or receives personal data from the EU in the course of running its business, it can be a bit tricky to determine whether or not EU Data Protection laws apply to you. The new Data Protection Regulation, expected sometime in 2015,...
|Risky Business: BLG Sees Cyber Risks Underlining Challenges to Canadian Businesses|
Eusis Dougan-McKenzie; Borden Ladner Gervais LLP;
January 16, 2015, previously published on December 16, 2014Toronto (December 16, 2014) — Cyber risks will be a dominant issue for Canadian businesses in 2015, according to Borden Ladner Gervais LLP (BLG) in its 2015 Top 10 Business Risks report. Following a Statistics Canada report that 14 per cent of large enterprises experienced an Internet...
|Issuer Banks’ Claims in Target Data Breach Litigation Survive Motion to Dismiss|
Kevin M. McGinty; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
January 16, 2015, previously published on December 4, 2014Federal District Judge Paul Magnuson has ruled that banks that issued credit and debit cards to customers whose data was stolen in the December 2013 Target data breach could continue to litigate claims against Target for negligence and violation of Minnesota’s Plastic Security Card Act...
|The Business of Cybercrime : Active Defense Against Hackers|
John M. Westercamp; Bose McKinney & Evans LLP;
January 16, 2015, previously published on November 14, 2014Experts estimate the economic costs of cybercrime are between $250 billion and $1 trillion a year. While the most public forms of cybersecurity breaches are data breaches similar to the Home Depot and Target incidents, much of the costs are driven by economic espionage. The most potent threats in...
|FDA to Hold Webinar on Cybersecurity in Medical Devices Guidance|
Mark A. McAndrew; Taft Stettinius & Hollister LLP;
January 16, 2015, previously published on October 28, 2014On Oct. 29, 2014, the United States Food and Drug Administration (FDA) will hold a webinar on its Final Guidance “Content of Premarket Submissions for Management of Cybersecurity in Medical Devices.” According to the FDA, the webinar seeks to explain the guidance and provide a forum for...
Matthew D. Lawless; Taft Stettinius & Hollister LLP;