Search Results (4697)
Documents on internet e commerce
Show: results per page
|US-EU Safe Harbor Framework Invalidated by European Court of Justice - What Now?|
Susan L. Foster, Cynthia J. Larose; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
October 13, 2015, previously published on October 6, 2015The Court of Justice of the EU (ECJ) has declared Safe Harbor invalid - in total. The ECJ has sent the case back to the Irish Data Protection Authority to determine whether Facebook Ireland’s transfer of personal data to the US is permitted under EU data protection law, in light of...
|REMINDER: Register for Wednesday Webinar! Another Cop on the Cybersecurity Beat: What to Do Before and After the SEC and FINRA Come Knockin|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
October 1, 2015, previously published on September 28, 2015The SEC has announced a new round of cybersecurity inspections at broker-dealer and registered investment advisory firms. If that’s not enough to catch your attention, just days after issuing the Risk Alert, the SEC censured and fined a St. Louis-based investment advisor for a failure to...
|Delaware Enacts Package Of Internet Data Laws|
Ieuan Jolly; Loeb & Loeb LLP;
September 28, 2015, previously published on September 2015Joining the collection of states with online privacy laws, Delaware has enacted a package of statutes governing the collection, storage and use of the personal information of Delaware residents by websites, Internet and cloud service providers, and Internet and mobile applications. While the...
|An Ounce of Prevention...|
Geoffrey G. Hemphill; Vandeventer Black LLP;
September 25, 2015, previously published on September 2015Too many times in my practice, clients have come to me in the midst of a tumultuous intracompany squabble. Owners who once thought they were going to start the next Microsoft or Apple are now at each other’s throats, lobbing all sorts of accusations and wrestling for control of the company....
|NAIC Adopts New Cybersecurity Exam Tool|
Mark D. Herlach, John S. Pruitt, Stephen E. Roth, Brian L. Rubin, Cynthia R. Shoss; Sutherland Asbill & Brennan LLP;
September 24, 2015, previously published on September 23, 2015On September 21, the National Association of Insurance Commissioners (the NAIC) IT Examination Working Group (the Working Group) adopted amendments to the IT section of the Financial Condition Examiners Handbook (the Handbook) to strengthen the Handbook¿s already existing cybersecurity guidance....
|Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)|
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
September 2, 2015, previously published on September 1, 2015The Third Circuit recently issued its highly anticipated ruling in the Federal Trade Commission v. Wyndham Worldwide Corp., Case. No. 14-3514, holding that the FTC has authority to regulate the cybersecurity practices of companies under the “unfair” prong of section 5 of the FTC Act. In...
|5 Deadly Sins Cyber Criminals Know About Law Firm Security|
Brent Cantrell, Fred Cobb, Justin Joy, William Kunkel; Lewis, Thomason, King, Krieg & Waldrop, P.C.;
September 2, 2015, previously published on August 2015Nearly every day we hear news of some new, large-scale cyber hack. For instance, the recent OPM database hack compromised personal information for over 21 million past and current federal employees and contractors. This attack, along with those on Target, Home Depot and several large insurance...
|The Ashley Madison Hack is More than Just Embarrassing|
McDonald Hopkins LLC;
August 25, 2015, previously published on August 21, 2015It was a bad week for people looking to cheat on their spouses - hackers publicly released the personal information of roughly 33 million users of the cheating site Ashley Madison. Aside from the obvious public embarrassment, many experts are saying the incident underscores the serious...
|Data Dump! AshleyMadison.com Fallout Deepens|
Wynter Lavier Deagle; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
August 20, 2015, previously published on August 20, 2015The Impact Team, the vigilante group behind the hacking of the infamous website AshleyMadison.com has followed through on its threat to leak the full database of the site’s users online. On Tuesday, August 18, 2015, an impressive 9.7 gigabytes of compressed data was posted to the dark web...
|Internet of Things and Cybersecurity|
Kevin L. LaRoche, Scott Widdowson; Borden Ladner Gervais LLP;
August 7, 2015, previously published on August 4, 2015The “Internet of Things” (IoT) is the developing web of objects embedded with microchips capable of allowing sending and receiving data, and so connecting them to the network we call the Internet. In an article in the Harvard Business Review late last year, Michael Porter and James...