Search Results (4697)
Documents on internet e commerce
Show: results per page
|Bill C-13: Lawful Access and the Relationship Between Organizations, Cyber-bullying and the Protection of Privacy Rights|
Marianne Bellefleur, Sean Griffin, Anne-Elisabeth Simard; McCarthy Tétrault LLP;
April 8, 2015, previously published on February 25, 2015On December 9, 2014, Bill C-13, An Act to amend the Criminal Code, the Canada Evidence Act, the Competition Act and the Mutual Legal Assistance in Criminal Matters Act (Act) - also known as the Protecting Canadians from Online Crime Act -, received the royal assent. The Act will come into force on...
|Florida's Fourth District Court of Appeal Holds That There is Minimal Privacy Interest in Social Media Accounts|
Victoria San Pedro; Rumberger, Kirk & Caldwell Professional Association;
April 7, 2015, previously published on March 9, 2015On January 7, 2015, Florida’s Fourth District Court of Appeal held that plaintiff in a personal injury suit has a limited privacy interest in his or her social networking site. See Nucci v. Target, &under;&under;&under; So. 3d &under;&under;&under;, 2015 WL 71726 (Fla. 4th DCA Jan. 7, 2015)....
|NYDFS to Collect Data on Cyber Security, but Could Hackers Use This Database as a Road Map to Launch Targeted Attacks?|
Jonathan L. Bing, Melissa K. Ventrone; Wilson Elser Moskowitz Edelman & Dicker LLP;
April 6, 2015, previously published on March 31 2015On March 26, 2015, the New York State Department of Financial Services (NYDFS) announced that it is broadening the scope of questions and topics in its current information technology (IT) examination framework. In addition, the NYDFS requires insurers to provide a response to 16 questions about...
|Astroturfing the Grassroots|
John B. King; Breazeale, Sachse & Wilson, L.L.P.;
April 6, 2015, previously published on March 23, 2015Astroturfing is the practice of masking the sponsors of a message to make it appear as though it originates from and is supported by grassroots participants. A grassroots movement is one naturally and spontaneously originating at the local level to give voice to a particular point of view.
|How To Appropriately Obtain Relevant Information From Social Networking Sites|
Brett M. Anders, Michael A. Frankel; Jackson Lewis P.C.;
April 6, 2015, previously published on February 12, 2015A New York state appellate court has confirmed that the mere initiation of a lawsuit does not provide a basis to permit a defendant unfettered access to a plaintiff’s social media sites. In Pecile v. Titan Capital Group, LLC, 2014 N.Y. App. Div. LEXIS 420 (1st Dep’t Jan. 23, 2014), the...
|The Need for Speed Online: Don’t Just Sit There!|
Eric J. Sinrod; Duane Morris LLP;
April 6, 2015, previously published on February 10, 2015Do you ever get up in the morning, feeling sluggish and just not up to the tasks that await you? For most of us, the answer is yes, at least once in a while.
|FTC May Have Authority to Regulate Companies’ Data Security Practices|
Jenna K. Shedd, Lawrence J. Tabas; Obermayer Rebmann Maxwell & Hippel LLP;
April 6, 2015, previously published on March 5, 2015Between 2008 and 2010, hackers stole credit card information from the computer network of Wyndham Hotels & Resorts LLC (“Wyndham”), which affected hundreds of thousands of Wyndham’s customers in the process. The Federal Trade Commission (the “FTC”) took action and...
|Cybersecurity: a Few of my Favorite Videos and Some Thought Provoking Questions|
Ralph C. Losey; Jackson Lewis P.C.;
April 6, 2015, previously published on February 17, 2015One of my passions is Cybersecurity, especially in the context of electronic discovery. I am focused on safeguarding the electronic data of the clients of my law firm. There are many black hat hackers out there, and even foreign governments, that hack into the computers of U.S. corporations and law...
|Cyber Insurance: Do I Really Need It?|
William C. Wagner; Taft Stettinius & Hollister LLP;
April 1, 2015, previously published on March 23, 2015*This is the first post in a five-part series on cyber insurance, culminating in a webinar entitled “Insurance Coverage for Privacy and Data Breaches: Hot Topics and Critical Issues” on Wednesday, April 22, 2015, at 12:00-1:00 p.m. Eastern.
|Twitter Takes Action Against Revenge Porn|
Michael Keenan; Hinman, Howard & Kattell, LLP;
April 1, 2015Earlier this month Twitter updated its use policy to specifically ban revenge porn. Revenge porn is a dastardly practice where a person (typically a man, but not always) posts intimate photos of their former partner (typically a woman, but not always) on a public website. Revenge porn is...