Search Results (4750)
Documents on internet e commerce
Show: results per page
|Montana and Wyoming Expand Data Breach Notice Requirements|
Joseph F. Bermudez, Scott Sweeney; Wilson Elser Moskowitz Edelman & Dicker LLP;
May 6, 2015, previously published on April 28, 2015Companies that electronically store personal information about residents of Montana and Wyoming must now take note of additional notice requirements following data breach incidents. With the ever-increasing number of such occurrences, states such as Montana and Wyoming are striving to clarify what...
|Do It Yourself Medicine Subject To Criticism|
Patrick S. Schoenburg; Wood, Smith, Henning & Berman LLP;
May 5, 2015, previously published on April 29, 2015Any internet search of terms related to mold injuries will bring up advertisements for medical labs offering blood testing or related diagnostic procedures, for a price. These tests claim to be capable of identifying “symptoms of mold exposure” or “mold sickness.” Notably,...
|Cyber-Risk Management - Guidance for Corporate Directors|
Bradley J. Freedman; Borden Ladner Gervais LLP;
April 28, 2015, previously published on April 14, 2015Cyber-risk management is an increasingly important challenge for corporate directors. Many commentators have said that there are only two types of organizations - those that have been hacked and know it, and those that have been hacked and don’t know it yet. Corporate directors have a legal...
|Cybersecurity—Sophisticated Scams Target Corporate Transactions and Confidential Information: Cyber Criminals Are Reportedly Pairing Falsified Wire Instructions with Seemingly Credible Justifications in Attempts to Misdirect Funds to Third-Party Accounts and Tricking Executives and Advisers into Compromising Sensitive Non-Public Information|
Jay Clayton, John Evangelakos, Eric J. Kadel, Scott D. Miller, Alexander J. Willscher; Sullivan & Cromwell LLP;
April 28, 2015, previously published on April 16, 2015Recent reports indicate that sophisticated cyber criminals are increasingly targeting company executives and their outside counsel, advisers, and consultants in connection with corporate transactions in fraudulent efforts to obtain funds or inside information. These schemes involve hacked systems...
|Decoding the New Payment Card Security Standard|
James J. Giszczak, Sara Hutchins Jodka, Dominic A. Paluzzi; McDonald Hopkins LLC;
April 27, 2015, previously published on March 3, 2015It's been a little over a year since the latest version of the Payment Card Industry Data Security Standard (PCI DSS) was released. Given the proliferation and severity of data breaches in the last year, the newly released standards will hopefully help mitigate risk of financial fraud when using...
|Cyberthreat Data Sharing Legislation Advances|
Sutherland Asbill Brennan LLP;
April 24, 2015, previously published on April 23, 2015The House on April 22 passed legislation granting liability protections to U.S. companies that share cyberthreat information with each other and the federal government. The Protecting Cyber Networks Act (H.R. 1560) would allow companies to voluntarily share information on cyberthreat indicators and...
|The Anthem Breach Silver Lining|
Diane D. Reynolds; Taft Stettinius & Hollister LLP;
April 23, 2015, previously published on February 5, 2015Anthem may have just experienced the largest health care data breach in U.S. history, with potentially 80 million individuals at risk from this “very sophisticated external cyber-attack,” according to Anthem Chief Executive Joseph Swedish. There will be months of analysis, debate and...
|The Art of (Cyber) War: Cybersecurity Tactics for All Financial Institutions|
James J. Giszczak, Richik Sarkar; McDonald Hopkins LLC;
April 21, 2015, previously published on April 14, 2015In today’s rapidly changing technological age, with personal, financial and health information stored on devices, Internet, and in the cloud, cyber and data security controls and programs are critical. As financial institutions of every type and size - national, regional and community banks,...
|Safeguarding Your Information Assets: Are You Prepared?|
Stephenie Wingyuen Yeung; Schnader Harrison Segal & Lewis LLP;
April 20, 2015, previously published on January 2015In view of the well-publicized data breaches in 2014 and the current renewed federal legislative focus on privacy and data security issues, we are providing this Alert to highlight some action items to safeguard your company’s information assets, and reduce exposure to liability in the event...
|White House Issues Proposal for FTC-Regulated Data Privacy Protection|
M. Christine Carty; Schnader Harrison Segal & Lewis LLP;
April 20, 2015, previously published on March 2015On February 27, 2015, the White House proposed legislation to protect consumers’ personal data and information that is collected and used by private companies and nonprofits. Federal and state governments and their agencies are not covered by the proposed law.