Search Results (4666)
Documents on internet e commerce
Show: results per page
|President Obama to Call For National Data Breach Notification Law and Other Cybersecurity Measures|
Joseph J. Lazzarotti; Jackson Lewis P.C.;
March 31, 2015, previously published on January 12, 2015About two years ago, President Obama signed an executive order on the date that he delivered his State of the Union address which directed certain federal agencies to develop voluntary standards for achieving cybersecurity. Preparing for his 2015 State of the Union address, Bloomberg and other news...
|Where Has All the Privacy Gone?|
Eric J. Sinrod; Duane Morris LLP;
March 30, 2015, previously published on January 13, 2015When it comes to privacy, a lyric from a Joni Mitchell song seems apt: “You don’t know what you’ve got till it’s gone.” Indeed, as technology has moved forward, it seems that practically every semblance of privacy has disappeared.
|Keeping Our Tech Love Alive|
Eric J. Sinrod; Duane Morris LLP;
March 30, 2015, previously published on January 28, 2015We live in a world in which we are bombarded with information data from many sources, and so much around us on the tech landscape is transparent. How, then, do we keep our tech love alive?
|FINRA on Cybersecurity |
Katharine F. Musso; Jones Walker LLP;
March 30, 2015, previously published on February 12, 2015The Financial Industry Regulatory Authority ("FINRA") focused on broker-dealer firms' preparedness for cyber attacks as a part of its 2014 targeted exams. On February 3, it published a "Report on Cybersecurity Practices" resulting from a 2011 survey and the 2014 exam sweep....
|$1 Billion Carbanak Heist Reminds Bankers of Continued Cybersecurity Risk |
Neal C. Wise; Jones Walker LLP;
March 30, 2015, previously published on February 19, 2015Global cybersecurity firm, Kasperksy Lab, released a report this week that a hacker gang dubbed "Carbanak" has looted as much as $1 billion from more than 100 banks in 30 countries worldwide. The report revealed two startling details in addition to the eye-popping amount of stolen money:...
|Fourth Circuit Affirms Maryland District Court’s Decision That Volenti Non Fit Injuria Precluded Internet Provider’s Recovery Under California and Maryland Anti-Spam Statutes|
Jhanelle A. Graham; Semmes, Bowen & Semmes A Professional Corporation;
March 27, 2015, previously published on February 2015In Beyond Systems, Inc. v. Kraft Foods, Incorporated, internet service provider, Beyond Systems, Inc. sought statutory damages from Kraft Foods, Inc. (“Kraft”) and Connexus Corporation (“Connexus”) (collectively, “Defendants”) under California’s and...
|Data Breach Security: The Five Best Questions Every Organization Should Answer|
Diane D. Reynolds, William C. Wagner; Taft Stettinius & Hollister LLP;
March 27, 2015, previously published on January 6, 2015The news headline “Jimmy John’s Notifies Customers of Payment Card Security Incident” caught our attention because the credit and debit card information was stolen at 216 Jimmy John’s locations, some of which are in states where Taft has offices (Arizona, Illinois, Indiana,...
|Telecom Business Alert - Open Internet and Municipal Broadband Orders, Rural Call Completion Reporting, FirstNet Activities, K&H Attorneys to speak at IWCE Conference, Webinar Audios Available - Vol XII, Issue 11|
C. Douglas Jarrett, Gregory E. Kunkle, Thomas B. Magee, Tracy P. Marshall, Jack Richards; Keller and Heckman LLP;
March 27, 2015, previously published on March 16, 2015Last week, the FCC released its Open Internet Order (Order) adopted on February 26, 2015. Under the Order, a broadband Internet access service provider may not block lawful content, applications, services, or the attachment of non-harmful devices. Further, it may not “impair or degrade lawful...
|Simplifying Classroom Consent: the FTC’s Guidance on COPPA in Schools|
Matthew D. Lawless; Taft Stettinius & Hollister LLP;
March 27, 2015, previously published on January 29, 2015The Children’s Online Privacy Protection Act (“COPPA”) governs an online operator’s collection of personal information from children, i.e., those under 13 years of age. Generally, the act requires verifiable parental consent before an online operator may collect a...
|OCIE Risk Alert on Cybersecurity: SEC’s Office of Compliance Inspections and Examinations Announces Findings from its Cybersecurity Examination Initiative|
Jay Clayton, John Evangelakos, Scott D. Miller, Nader A. Mousavi, Frederick Wertheim; Sullivan & Cromwell LLP;
March 27, 2015, previously published on February 5, 2015On February 3, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) published a Risk Alert summarizing findings from its Cybersecurity Examination Initiative relating to broker-dealers and investment advisers, which was announced in April 2014. A copy of the Risk...