Join Matindale-Hubbell Connected

Search Results (4697)

Documents on internet e commerce

View Page: Prev  1  2  3  4  5  6  7  8  9  10  Next  >>
Show: results per page
Sort by:
Sponsored Results

HTMLBill C-13: Lawful Access and the Relationship Between Organizations, Cyber-bullying and the Protection of Privacy Rights
Marianne Bellefleur, Sean Griffin, Anne-Elisabeth Simard; McCarthy Tétrault LLP;
Legal Alert/Article
April 8, 2015, previously published on February 25, 2015
On December 9, 2014, Bill C-13, An Act to amend the Criminal Code, the Canada Evidence Act, the Competition Act and the Mutual Legal Assistance in Criminal Matters Act (Act) - also known as the Protecting Canadians from Online Crime Act -, received the royal assent. The Act will come into force on...


HTMLFlorida's Fourth District Court of Appeal Holds That There is Minimal Privacy Interest in Social Media Accounts
Victoria San Pedro; Rumberger, Kirk & Caldwell Professional Association;
Legal Alert/Article
April 7, 2015, previously published on March 9, 2015
On January 7, 2015, Florida’s Fourth District Court of Appeal held that plaintiff in a personal injury suit has a limited privacy interest in his or her social networking site. See Nucci v. Target, &under;&under;&under; So. 3d &under;&under;&under;, 2015 WL 71726 (Fla. 4th DCA Jan. 7, 2015)....


HTMLNYDFS to Collect Data on Cyber Security, but Could Hackers Use This Database as a Road Map to Launch Targeted Attacks?
Jonathan L. Bing, Melissa K. Ventrone; Wilson Elser Moskowitz Edelman & Dicker LLP;
Legal Alert/Article
April 6, 2015, previously published on March 31 2015
On March 26, 2015, the New York State Department of Financial Services (NYDFS) announced that it is broadening the scope of questions and topics in its current information technology (IT) examination framework. In addition, the NYDFS requires insurers to provide a response to 16 questions about...


HTMLAstroturfing the Grassroots
John B. King; Breazeale, Sachse & Wilson, L.L.P.;
Legal Alert/Article
April 6, 2015, previously published on March 23, 2015
Astroturfing is the practice of masking the sponsors of a message to make it appear as though it originates from and is supported by grassroots participants. A grassroots movement is one naturally and spontaneously originating at the local level to give voice to a particular point of view.


HTMLHow To Appropriately Obtain Relevant Information From Social Networking Sites
Brett M. Anders, Michael A. Frankel; Jackson Lewis P.C.;
Legal Alert/Article
April 6, 2015, previously published on February 12, 2015
A New York state appellate court has confirmed that the mere initiation of a lawsuit does not provide a basis to permit a defendant unfettered access to a plaintiff’s social media sites. In Pecile v. Titan Capital Group, LLC, 2014 N.Y. App. Div. LEXIS 420 (1st Dep’t Jan. 23, 2014), the...


HTMLThe Need for Speed Online: Don’t Just Sit There!
Eric J. Sinrod; Duane Morris LLP;
Legal Alert/Article
April 6, 2015, previously published on February 10, 2015
Do you ever get up in the morning, feeling sluggish and just not up to the tasks that await you? For most of us, the answer is yes, at least once in a while.


HTMLFTC May Have Authority to Regulate Companies’ Data Security Practices
Jenna K. Shedd, Lawrence J. Tabas; Obermayer Rebmann Maxwell & Hippel LLP;
Legal Alert/Article
April 6, 2015, previously published on March 5, 2015
Between 2008 and 2010, hackers stole credit card information from the computer network of Wyndham Hotels & Resorts LLC (“Wyndham”), which affected hundreds of thousands of Wyndham’s customers in the process. The Federal Trade Commission (the “FTC”) took action and...


HTMLCybersecurity: a Few of my Favorite Videos and Some Thought Provoking Questions
Ralph C. Losey; Jackson Lewis P.C.;
Legal Alert/Article
April 6, 2015, previously published on February 17, 2015
One of my passions is Cybersecurity, especially in the context of electronic discovery. I am focused on safeguarding the electronic data of the clients of my law firm. There are many black hat hackers out there, and even foreign governments, that hack into the computers of U.S. corporations and law...


HTMLCyber Insurance: Do I Really Need It?
William C. Wagner; Taft Stettinius & Hollister LLP;
Legal Alert/Article
April 1, 2015, previously published on March 23, 2015
*This is the first post in a five-part series on cyber insurance, culminating in a webinar entitled “Insurance Coverage for Privacy and Data Breaches: Hot Topics and Critical Issues” on Wednesday, April 22, 2015, at 12:00-1:00 p.m. Eastern.


HTMLTwitter Takes Action Against Revenge Porn
Michael Keenan; Hinman, Howard & Kattell, LLP;
Legal Alert/Article
April 1, 2015
Earlier this month Twitter updated its use policy to specifically ban revenge porn. Revenge porn is a dastardly practice where a person (typically a man, but not always) posts intimate photos of their former partner (typically a woman, but not always) on a public website. Revenge porn is...


View Page: Prev  1  2  3  4  5  6  7  8  9  10  Next  >>