Search Results (2514)
Documents on computer data services
Show: results per page
|First fines imposed in Germany on companies for still relying on Safe Harbor|
Viola Bensinger, Carsten Kociok; Greenberg Traurig Germany, LLP;
July 7, 2016, previously published on June 14, 2016On June 6, 2016, the Hamburg Commissioner for Data Protection imposed fines on three internationally operating companies for still relying on Safe Harbor as the basis for their data transfers to the U.S.
|Agencies Establish Baseline Cybersecurity Safeguards for Information Systems Containing Federal Contract Information|
Chad O. Dorr, Christopher M. Tipler, D. Grayson Yeargin; Jones Day;
June 26, 2016, previously published on June 2016Continuing its race to protect sensitive data, the United States federal government recently added cybersecurity requirements that establish basic safeguards governing information systems that government contractors must implement for new procurements. Effective June 15, 2016, the government is...
|Illinois Joins the Fray: Strengthens its Laws Around Data Breach Notification and Data Security|
Michael Katz, Cynthia J. Larose, Julia M. Siripurapu; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
June 22, 2016, previously published on June 14, 2016Sophisticated phishing scams and muscular hacking efforts continue to compromise personal and sensitive information held by insurers, hospital systems, and businesses large and small. In response, many states have strengthened their data breach notification and have enacted data security laws to...
|Data Privacy Bulletin: Essential Computer Security Tips for All Businesses and Employees|
Jack Pringle; Adams and Reese LLP;
June 14, 2016, previously published on April 28, 2016In a connected world, sound information security practices are crucial for every employee of a business. Even a single simple lapse in judgment, like clicking on a link in a “phishing” email, can put all computer networks- and the sensitive information stored on them- at risk.
|CRS and Beneficial Ownership|
Filippo Noseda; Withers Bergman LLP;
June 9, 2016, previously published on May 16, 2016In today’s difficult economic climate, countries need more than ever to ensure that they collect all the tax revenues that are due to them in order to fund public expenditure and reduce public debt. The arrival of new technologies has made it easier to collect and exchange information to...
|Fourth Circuit Confirms Coverage for Data Breaches Claims Under Traditional CGL Insurance Policies|
Richard (Rich) DeNatale, Celia Jackson, Richard D. Milone; Jones Day;
May 10, 2016, previously published on April 2016In a highly anticipated decision, the Fourth Circuit has ruled that commercial general liability ("CGL") insurance policies provide defense coverage for class action lawsuits arising from a data breach. The decision, Travelers Indemnity Company of America v. Portal Healthcare Solutions,...
|Government Guidance for Preventing and Responding to Ransomware Attacks|
Bradley J. Freedman; Borden Ladner Gervais LLP;
May 10, 2016, previously published on April 26, 2016Ransomware attacks are a significant and increasing threat to organizations of all kinds. Government agencies have recently issued guidance for preventing and responding to ransomware attacks. Organizations should consider that guidance and take appropriate steps to prevent, and prepare to respond...
|EU General Data Protection Regulation: What Impact for Businesses Established Outside the EU|
Françoise Gilbert; Greenberg Traurig, LLP;
May 10, 2016, previously published on April 19, 2016The 261-page final draft of the EU General Data Protection Regulation (GDPR), which replaces Directive 95/46/EC (Directive), was formally approved by the EU Parliament on April 14, 2016. The document is expected to be published in the Official Journal of the European Union (EU) in June, and to...
|Restrictive Covenant Update|
Adam Guy; Borden Ladner Gervais LLP;
April 18, 2016, previously published on March 31, 2016Two brothers, Jason and Jeffrey, worked for Computer Enhancement Corporation ("CEC"). Jeffrey secretly competed against CEC using inside knowledge while still employed and was fired. One month later, Jason quit without notice, but not before he and Jeffrey incorporated a business to...
|Utah Enacts New Laws Addressing Post-Employment Restrictions and Unauthorized Computer Use|
Clifford R. Atlas, Conrad S. Kee; Jackson Lewis P.C.;
April 15, 2016, previously published on April 7, 2016Utah has enacted two new laws of importance to employers concerned about trade secrets, customer relationships, and other protectable interests in its 2016 legislative session. The first statute, the Post-Employment Restrictions Act (Utah Code § 34-51-101, et seq.), sets a one-year time limit...