Search Results (4483)
Documents on internet e commerce
Show: results per page
|The Cybersecurity Race: Executive Branch Takes The Lead While Congress Watches From The Bleachers|
Alexander W. Major; Sheppard, Mullin, Richter & Hampton LLP;
April 22, 2014, previously published on April 18, 2014The federal government sector has been abuzz lately with whispers and shouts about pending cybersecurity regulations, frameworks, and requirements. This attention is not particularly surprising, especially given the recent high-profile data breaches, the litigation threats surrounding those...
|The UK Government’s Cyber Essentials Scheme Launched on 7 April 2014 - Will It have Any Impact on the Cyber-Security Landscape?|
Jonny McDonald, Sarah Pearce; Edwards Wildman Palmer LLP;
April 16, 2014, previously published on April 14, 2014The Scheme (in its own words) “identifies the security controls that organisations must have in place within their IT system in order to have confidence that they are beginning to mitigate the risk from internet-based threats”. Moreover, “all organisations are free to implement it...
|Applicant is not a Broadcasting Undertaking; thus held Not to have Previous Use in Broadcasting Services|
Adrian J. Howard, Beverley Moore, Chantal Saunders, Ryan Steeves; Borden Ladner Gervais LLP;
April 15, 2014, previously published on April 9, 2014In this case, Unicast brought an application pursuant to s. 57 of the Trade-marks Act requesting expungement of the trade-mark “RED FM” from the Register. The Court dismissed the application.
|Regulatory Agencies Address Virtual Currency|
Katharine F. Musso; Jones Walker LLP;
April 15, 2014, previously published on April 3, 2014In remarks delivered on March 18, 2014, David S. Cohen, the Under Secretary for Terrorism and Financial Intelligence at FinCEN, warned of the various illicit finance risks presented by virtual currencies. Although the anonymity enjoyed by criminals using virtual currency for illegal trade is a...
|Social Media Generates Amendment to Right to Privacy Act|
Ryan A. Haas; Chuhak & Tecson, P.C.;
April 14, 2014, previously published on April 2, 2014Can an employer in Illinois lawfully require an employee to provide a password or access to his or her LinkedIn account? Under the recent amendment to the Illinois Right to Privacy Act, it depends on whether the account is considered a “professional account” or a “personal...
|Is Wheeler Gaga for Gigabit? The FCC Liberates 100 MHz of Spectrum for Unlicensed Wi-Fi|
Douglas A. "Drew" Svor, Dave Thomas; Sheppard, Mullin, Richter & Hampton LLP;
April 11, 2014, previously published on April 7, 2014On April 1, the FCC took steps to remedy a small but growing annoyance of modern life: poor Wi-Fi connectivity. Removing restrictions that had been in place to protect the mobile satellite service uplinks of Globalstar, and by unanimous vote, the FCC’s First Report and Order on U-NII will...
|Pinterest Contest Draws FTC Warning|
Barry M. Benjamin, Lindsay A. Victor; Kilpatrick Townsend & Stockton LLP;
April 11, 2014, previously published on April 8, 2014A Pinterest contest conducted by Cole Haan, Inc. recently resulted in an FTC warning. Shoe company Cole Haan held a contest via Pinterest that required contestants to create a board entitled “Wandering Sole.” Contestants then had to pin at least five images from Cole Haan’s...
|Four Things You Need to Know About the SEC Roundtable on Cybersecurity|
Steven G. Brody, Jason E. Glass; Bingham McCutchen LLP;
April 10, 2014, previously published on April 7, 2014Cybersecurity failures in 2013 exposed the vulnerabilities of the financial markets, financial institutions, and public companies to cyber-incursions. In setting an agenda for 2014, the U.S. Securities and Exchange Commission (SEC) announced that it would begin scrutinizing the cybersecurity...
|Email Use Policies Must Be Meaningful|
Kelly Friedman; Davis LLP;
April 8, 2014, previously published on March 24, 2014Coming up in the elevator this morning, I was reading the “Elevator News Network” (I am on the 60th floor, so it is hard not to stare at something!). It contained a bit of advice about Email Use Policies. The advice: Do not allow personal emails before noon, so as to ensure your...
|When is an E-mail a Business Record?|
Kelly Friedman; Davis LLP;
April 8, 2014, previously published on March 27, 2014Following my previous post, “E-mail Use Policies Must Be Meaningful,” it was pointed out to me, quite rightly, that a difficult part of implementing an e-mail use policy is defining what is a “business record.”