Search Results (2506)
Documents on computer data services
Show: results per page
|Restrictive Covenant Update|
Adam Guy; Borden Ladner Gervais LLP;
April 18, 2016, previously published on March 31, 2016Two brothers, Jason and Jeffrey, worked for Computer Enhancement Corporation ("CEC"). Jeffrey secretly competed against CEC using inside knowledge while still employed and was fired. One month later, Jason quit without notice, but not before he and Jeffrey incorporated a business to...
|Utah Enacts New Laws Addressing Post-Employment Restrictions and Unauthorized Computer Use|
Clifford R. Atlas, Conrad S. Kee; Jackson Lewis P.C.;
April 15, 2016, previously published on April 7, 2016Utah has enacted two new laws of importance to employers concerned about trade secrets, customer relationships, and other protectable interests in its 2016 legislative session. The first statute, the Post-Employment Restrictions Act (Utah Code § 34-51-101, et seq.), sets a one-year time limit...
|Panama Papers Leak 11.5 Million Documents, Exposing Public Officials|
Sutherland Asbill Brennan LLP;
April 11, 2016, previously published on April 8, 2016On Sunday, April 3, 11.5 million confidential documents exposing a widespread system of global tax evasion were made public as a result of a hack. The documents, which were records of the Panamanian corporate service provider and law firm Mossack Fonseca, were obtained by an anonymous source,...
|EU and U.S. Release Terms of Privacy Shield|
Paloma Bru, Jonathon R. Little, Mauricio F. Paez, Elizabeth Robertson, Undine von Diemar; Jones Day;
March 31, 2016, previously published on March 2016The European Commission ("EC") and U.S. Department of Commerce ("DOC") recently released the full text of the EU¿U.S. Privacy Shield framework. This release follows the February 2, 2016, announcement that EU and U.S. officials had reached an agreement to replace the...
|Save Your Data and Your Dollars: Tips to Prevent "Ransomware" from Holding Your Company Hostage|
James R. Dutro, Colin Leary, Daniel J. McLoon, Mauricio F. Paez, Jeffrey Rabkin; Jones Day;
March 22, 2016, previously published on February 2016On February 15, 2016, a Los Angeles-based hospital paid cyber criminals $17,000, in the form of 40 Bitcoins, to restore access to electronic medical records and email systems. The hospital—Hollywood Presbyterian Medical Center—had been operating offline for more than a week after...
|Significant Change to ESI Preservation Under the Federal Rules of Procedure|
Christopher P. Hanslik; BoyarMiller A Professional Corporation;
March 22, 2016, previously published on November 24, 2015In recent years, the cost of complex litigation has soared due to the growth of electronically stored information (ESI). Standard discovery requests now include a request for the opposing party to produce a multitude of electronic data from the other party - emails, documents, text messages, file...
|CISA Guidelines: Privacy and Civil Liberties Interim Guidelines for Federal Agencies|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
March 11, 2016, previously published on March 2, 2016Last week, we discussed the Federal government’s first steps toward implementing the Cybersecurity Information Sharing Act (CISA). Among the guidance documents released by the Department of Homeland Security and the Department of Justice were the Privacy and Civil Liberties Interim...
|California Attorney General Releases Data Breach Report|
Daniel J. McLoon, Michael G. Morgan, Jeffrey Rabkin, David W. Schecter, Gregory P. Silberman; Jones Day;
March 3, 2016, previously published on February 2016On Tuesday, February 16, 2016, the California Attorney General's Office released its Data Breach Report, analyzing the 657 data breaches reported to the Attorney General's office from 2012 to 2015. According to the report, the majority of the reported breaches were the result of security failures....
|Data Breaches are on the Rise in Australia: What if it Happens to You?|
Peter T. Brabant, Adam Salter, Nicola Walker; Jones Day;
March 3, 2016, previously published on February 2016Data breaches are becoming more prevalent in Australia. While the reporting of data breaches to regulators or affected customers or clients is presently not mandatory, the Office of the Australian Information Commissioner ("OAIC") received 110 voluntary data breach notifications in...
|"Privacy Shield" is Proposed to Replace Invalidated U.S. - EU Safe Harbor Agreement and Keep Data from Europe Flowing|
Scott J. Wenner; Schnader Harrison Segal & Lewis LLP;
February 29, 2016, previously published on February 2016The Safe Harbor agreement between the European Union and the United States permitted American businesses to import personal data of EU citizens based on self-certification of compliance with EU data protection laws. Safe Harbor was widely criticized in Europe as being too easily circumvented, too...