Search Results (4601)
Documents on internet e commerce
Show: results per page
|HIPAA hurts: Jury Verdict Upheld against Walgreen Co. for $1.8 Million|
Kimberly T. Boike; Chuhak & Tecson, P.C.;
March 23, 2015, previously published on March 12, 2015It seems like every day in the news there is a new story about electronic data breaches from hackers. While these types of data breaches tend to make the front page headlines, hackers account for only a small percentage of reported breaches under the Health Insurance Portability and Accountability...
|Court Decertifies Class Action Suit against Henry Ford Health System for Data Breach|
Zachary W. Behler, Michael R. Blum, Lauren B. Dunn, Samuel J. Frederick, Gilbert M. Frimet; Foster, Swift, Collins & Smith, P.C.;
March 20, 2015, previously published on February 4, 2015The Michigan Court of Appeals recently decertified a class action suit against Henry Ford Health System (HFHS) and its subcontractor, a medical transcription service, for inadvertently disclosing sensitive patient information online. On December 18, 2014, a unanimous three-judge panel reversed the...
|Has Facebook Invaded Its BC Users Privacy|
Harpreet Dosanjh; Singleton Urquhart LLP;
March 20, 2015, previously published on March 2, 2015If you have access to a computer, the chances are good that you or someone you know belong to the social media site, Facebook. If you are a registrant you are aware that after joining the site you may create a personal profile, add other users, exchange messages, post photos, etc. What you may not...
|What Happens When a Twitter 'Tweet' of a Few Words Becomes a Horse Industry Defamation Lawsuit?|
Julie I. Fershtman; Foster, Swift, Collins & Smith, P.C.;
March 20, 2015, previously published on February 4, 2015At Foster Swift, we've successfully defended equine-related defamation litigation. Today we're sharing an interesting case from Massachusetts that arose from a "tweet" of only a few words.
|Government, Businesses Prioritize Cybersecurity Spending|
Rebecca J. Bennett; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 20, 2015, previously published on February 10, 2015If spending is a good indicator of shifting priorities for both business and government, then cybersecurity is quickly becoming priority number one.
|Honored in the Breach: Employer Action Items for an Insurer Data Breach|
Stephen A. Riga, Danielle Y. Vanderzanden, Timothy G. Verrall; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 5, 2015This morning, Anthem Blue Cross and Blue Shield, one of the largest health insurers in the country, notified its policyholders, members, and business partners that it was recently the target of an external cyber attack that appears to have comprised the confidentiality of medical and other personal...
|Getting Serious About Cybersecurity|
Eric J. Sinrod; Duane Morris LLP;
March 19, 2015, previously published on February 17, 2015Hack attacks have been in the news for a while. But the most recent headlines seem to indicate that hackers are far outpacing security efforts to contain them.
|The Duty to Report Data Leaks|
Jacomijn Christ, Hans Urlus; Greenberg Traurig, LLP;
March 19, 2015, previously published on March 5, 2015On Feb. 1, 2015, the Dutch House of Representatives voted in favor of a legislative bill introducing a duty to report data leaks. The bill, titled Duty to Report Data Leaks and the Expansion of the Administrative Penalty Competence of Dutch Data Protection Authority (Dutch DPA), will amend the...
|Will Companies Voluntarily Share Data Regarding Cyber Security at the President’s Request?|
Ashley Prickett Cuttino; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 16, 2015On Friday February 13, 2015, President Obama spoke at the White House Summit on Cybersecurity and Consumer Protection at Stanford University. After his address, President Obama signed an executive order, Promoting Private Sector Cybersecurity Information Sharing, that will encourage private...
|The Private Sector’s Role in the New Face of Homeland Security|
Madi Bakker, Ashley Prickett Cuttino; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 20, 2015The Obama administration recently announced the creation of the Cyber Threat Intelligence Integration Center (CTIIC), a new governmental agency created to prevent cyber threats by analyzing and integrating digital intelligence collected through government and non-government sources. The agency is...