Search Results (4462)
Documents on internet e commerce
Show: results per page
|Over 20 Million Customer Accounts Affected by Data Breaches in California; Attorney General Harris Promises Increased Enforcement|
Jake Romero; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
March 24, 2014, previously published on March 18, 2014When you think of catastrophic events that take place online and have a devastating effect on millions of people, you probably think of HBO Go crashing during the True Detective finale. However, California Attorney General Kamala Harris wants to remind you that you should be thinking about data...
|Cybersecurity Assessments - Using the Tool Well|
Michael J. Baader, Jamie Barnett, David M. DeSalle, Anthony J. Rosso, Bobby N. Turnage; Venable LLP;
March 19, 2014, previously published on March 17, 2014Are you considering a cybersecurity assessment? If you heard Venable's presentation, "New Cybersecurity Framework Released: What You Need to Know," you might be.
|United States to Relinquish Remaining Control of the Internet and Oversight of the Internet Corporation for Assigned Names and Numbers (ICANN)|
Adam R. Bialek, Gregory N. Brescia; Wilson Elser Moskowitz Edelman & Dicker LLP;
March 19, 2014, previously published on March 18, 2014On Friday, March 14, 2014, after a little more than 15 years of control, the United States National Telecommunications and Information Administration (NTIA) announced its intention to relinquish its remaining control of the Internet and oversight of the Internet Corporation for Assigned Names and...
|Plan Now for Changes in Emailing Canadians|
Andrew B. Lustigman; Olshan Frome Wolosky LLP;
March 18, 2014, previously published on March 6, 2014Marketers who email Canadian residents need to plan now for a soon to be effective Canadian version of the CAN-SPAM Act that has some important differences from the U.S. version of the law. Unlike the United States, which operates on a notice of an opt-out paradigm, the Canadian law requires an...
|California Attorney General Urges Companies to be Prepared for Cyber Attacks and Security Breaches|
Kenneth R. Florin, Ieuan Jolly, Michael L. Mallow, Nerissa Coyle McGinn, James D. Taylor; Loeb & Loeb LLP;
March 18, 2014, previously published on March 2014Kamala Harris, California's Attorney General, issued a set of recommendations for preventing and responding to cyber attacks and security breaches. The recommendations, called Cybersecurity in the Golden State, are directed to small and medium-sized businesses, which often lack the resources of a...
|Combating the Sale of Counterfeit Goods Online: Don’t Let Someone Get Away with Selling Knockoffs of Your Products|
Jordan S. Cohen, Whitney C. Gibson, James W. Kelly; Vorys, Sater, Seymour and Pease LLP;
March 18, 2014, previously published on March 14, 2014Trademark counterfeiting, in general, refers to the placement of a trademark on a product that is not the legitimate product offered by the trademark owner. Meanwhile, the Lanham Act - the U.S. federal trademark statute - defines a counterfeit as “a spurious mark that is identical with, or...
|To Native or Not to Native, That Is the Question|
Licyau Wong; Foley & Lardner LLP;
March 18, 2014, previously published on March 14, 2014Here at IT-Lex, we write a lot about the form of producing documents. (For instance, see here, here, here, and here) Producing in TIFF format has long been the standard-bearer in electronic discovery, while PDFs are a second-favorite. However, these are not the only two options a lawyer has when...
|Yahoo! Unhappy With TCPA Ruling; Seeks Reconsideration|
Scott A. Shaffer; Olshan Frome Wolosky LLP;
March 18, 2014, previously published on March 6, 2014In Sherman v. Yahoo! Inc., decided on February 3, 2014 in the Southern District of California, Yahoo! failed to convince the court that a lawsuit against it should fail because Yahoo! did not use an Automatic Telephone Dialing System (ATDS) to send text messages, as that term is defined under the...
|Boston Discussion - NIST Framework - March 25|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
March 17, 2014, previously published on March 4, 2014The National Institute of Standards and Technology (NIST) last month released its final Cybersecurity Framework. Developed under an executive order from President Obama with extensive input and feedback from industry security professionals, the new NIST framework is designed to help companies in...
|Imitation Protection of Internet Sites by Copyright Law|
Michael Rainer, Michael Rainer; GRP Rainer LLP;
March 17, 2014, previously published on March 14, 2014The operator of an Internet address has, as a rule, a special interest in the protection of his advertising appearance on the Internet against imitation. However, such a protection, from the copyright law, is guaranteed only up to a certain creation/design point.