Search Results (2213)
Documents on computer software
Show: results per page
|Data Privacy: Wyndham Hotel's Wake Up Call Should Be Your Own|
Carl "Chuck" N. Kunz; Morris James LLP;
September 21, 2015, previously published on August 27, 2015On August 24, 2015, the United States Court of Appeals for the Third Circuit issued a precedential opinion in the matter of Federal Trade Commission v. Wyndham Worldwide Corporation, et al., No. 14-3514 (3d. Cir., Aug. 24, 2015). The long-awaited opinion affirmed an earlier denial of...
|Russia’s Data Localization Requirement Will Take Effect September 1|
Pavel Arievich, Michael Malloy; DLA Piper (Canada) LLP;
September 9, 2015, previously published on July 8, 2015These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian citizens, whether one is located in Russia or abroad. The law will apply even to entities located outside of Russia.
|Cyber Liability for the Public Body|
Chrissie Peterson; Heyl, Royster, Voelker & Allen Professional Corporation;
September 7, 2015, previously published on August 2015Major security and data breaches have become more prevalent in the past decade. News headlines are dominated by stories of major corporations having networks hacked and subjecting employees' and customers' personal, financial and health information to cyber threats.
|German Data Protection Commissioners Call for Improvements to the General Data Protection Regulation|
Ted-Philip Kroke, Mauricio F. Paez, Undine von Diemar; Jones Day;
September 7, 2015, previously published on September 2015As deliberations on the General Data Protection Regulation (“GDPR”) between the trialogue parties European Parliament, European Council, and European Commission reach the final stages, the Conference of the Data Protection Commissioners of the German Federation and the German States...
|Eliminating Tariffs on Information Technology (IT) Products: Expanded WTO List on the Horizon|
Sabrina A. Bandali, Jesse I. Goldman; Bennett Jones LLP;
August 7, 2015, previously published on July 24, 2015On July 24, 2015 the World Trade Organization (WTO) announced that negotiators had agreed on a list of products and draft declaration to expand the product scope of the 1996 Information Technology Agreement (ITA). The proposed "ITA 2" would eliminate tariffs on 20 additional products,...
Larry A. Silverman; Dickie, McCamey & Chilcote, P.C.;
|Processing of Personal Data for On-Line Profiling Purposes: The New Guidelines Issued by the Garante|
Ida Palombella; Withers Bergman LLP;
July 1, 2015, previously published on June 26, 2015The Italian Garante has issued new guidelines to clarify privacy requirements by which data controllers should abide in creating user profiles. These new guidelines have been effective since 6 May 2015, when they were published on the Official Gazette, and are addressed to private entities...
|Electronic Commerce Comes Under the Scrutiny of the European Commission|
Ida Palombella; Withers Bergman LLP;
July 1, 2015, previously published on June 26, 2015As announced in March 2015, the European Commission has launched an inquiry to identify potential non-compliant conduct carried out by companies in the e-commerce sector under European Antitrust Law. The Commission will issue a report summarizing its preliminary findings in mid-2016, and the final...
|Canadian Privacy Commissioner Issues Guidance for Privacy Law and CASL Compliance|
Bradley J. Freedman; Borden Ladner Gervais LLP;
May 12, 2015, previously published on April 30, 2015On April 27, 2015, the Office of the Privacy Commissioner of Canada issued a guidance document entitled “Anti-spam law’s changes to Canadian federal privacy law: A guide for businesses doing e-marketing” and a related “Helpful Tips” summary document. The Guide explains...
|Copyright and Licensing: When is Copyright Infringement Not Infringement?|
May 11, 2015, previously published by ParrisWhittaker.comThe High Court in the UK recently considered whether a company should pay damages for copyright infringement and/or breach of contract where software was used without consent.