Search Results (4739)
Documents on internet e commerce
Show: results per page
|Injunction Prohibiting Internet Search Results|
Bradley J. Freedman; Borden Ladner Gervais LLP;
April 9, 2015, previously published on March 24, 2015Equustek Solutions Inc. v. Jack, 2014 BCSC 1063, involved an application for an injunction prohibiting Google Inc. and Google Canada (collectively “Google”) from including the defendants’ websites in search results generated by Google’s search engines. The defendants used...
|The Internet of Things|
Lei Shen, Howard W. Waltzman; Mayer Brown LLP;
April 8, 2015, previously published on March 17, 2015The proliferation of smart phones raised novel privacy and security concerns due to the unprecedented amounts and types of personal information that these devices and their applications could collect, use, store and share. Many aspects of our lives-communications, social interactions, shopping,...
|Bill C-13: Lawful Access and the Relationship Between Organizations, Cyber-bullying and the Protection of Privacy Rights|
Marianne Bellefleur, Sean Griffin, Anne-Elisabeth Simard; McCarthy Tétrault LLP;
April 8, 2015, previously published on February 25, 2015On December 9, 2014, Bill C-13, An Act to amend the Criminal Code, the Canada Evidence Act, the Competition Act and the Mutual Legal Assistance in Criminal Matters Act (Act) - also known as the Protecting Canadians from Online Crime Act -, received the royal assent. The Act will come into force on...
|Florida's Fourth District Court of Appeal Holds That There is Minimal Privacy Interest in Social Media Accounts|
Victoria San Pedro; Rumberger, Kirk & Caldwell Professional Association;
April 7, 2015, previously published on March 9, 2015On January 7, 2015, Florida’s Fourth District Court of Appeal held that plaintiff in a personal injury suit has a limited privacy interest in his or her social networking site. See Nucci v. Target, &under;&under;&under; So. 3d &under;&under;&under;, 2015 WL 71726 (Fla. 4th DCA Jan. 7, 2015)....
|NYDFS to Collect Data on Cyber Security, but Could Hackers Use This Database as a Road Map to Launch Targeted Attacks?|
Jonathan L. Bing, Melissa K. Ventrone; Wilson Elser Moskowitz Edelman & Dicker LLP;
April 6, 2015, previously published on March 31 2015On March 26, 2015, the New York State Department of Financial Services (NYDFS) announced that it is broadening the scope of questions and topics in its current information technology (IT) examination framework. In addition, the NYDFS requires insurers to provide a response to 16 questions about...
|FTC May Have Authority to Regulate Companies’ Data Security Practices|
Jenna K. Shedd-Sawl, Lawrence J. Tabas; Obermayer Rebmann Maxwell & Hippel LLP;
April 6, 2015, previously published on March 5, 2015Between 2008 and 2010, hackers stole credit card information from the computer network of Wyndham Hotels & Resorts LLC (“Wyndham”), which affected hundreds of thousands of Wyndham’s customers in the process. The Federal Trade Commission (the “FTC”) took action and...
|Cybersecurity: a Few of my Favorite Videos and Some Thought Provoking Questions|
Ralph C. Losey; Jackson Lewis P.C.;
April 6, 2015, previously published on February 17, 2015One of my passions is Cybersecurity, especially in the context of electronic discovery. I am focused on safeguarding the electronic data of the clients of my law firm. There are many black hat hackers out there, and even foreign governments, that hack into the computers of U.S. corporations and law...
|How To Appropriately Obtain Relevant Information From Social Networking Sites|
Brett M. Anders, Michael A. Frankel; Jackson Lewis P.C.;
April 6, 2015, previously published on February 12, 2015A New York state appellate court has confirmed that the mere initiation of a lawsuit does not provide a basis to permit a defendant unfettered access to a plaintiff’s social media sites. In Pecile v. Titan Capital Group, LLC, 2014 N.Y. App. Div. LEXIS 420 (1st Dep’t Jan. 23, 2014), the...
|Astroturfing the Grassroots|
John B. King; Breazeale, Sachse & Wilson, L.L.P.;
April 6, 2015, previously published on March 23, 2015Astroturfing is the practice of masking the sponsors of a message to make it appear as though it originates from and is supported by grassroots participants. A grassroots movement is one naturally and spontaneously originating at the local level to give voice to a particular point of view.
|The Need for Speed Online: Don’t Just Sit There!|
Eric J. Sinrod; Duane Morris LLP;
April 6, 2015, previously published on February 10, 2015Do you ever get up in the morning, feeling sluggish and just not up to the tasks that await you? For most of us, the answer is yes, at least once in a while.